Sign In
Not register? Register Now!
You are here: HomeCourseworkTechnology
Pages:
6 pages/≈1650 words
Sources:
8 Sources
Level:
Turabian
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 38.88
Topic:

Human Intelligence Intervention Coursework Writing (Coursework Sample)

Instructions:

THE LECTURER REQUIRED THE STUDENTS TO Concisely describe and define a problem scenario that could benefit from Human Intelligence (HUMINT) intervention, gIVE AN EXAMPLE, historical BACKGROUND AND ISSUES RELATED TO humint and finally explain how humint is likely to offer a solution to the problem.

source..
Content:

HUMAN INTELLIGENCE INTERVENTION
Name
Course
Instructor
Date
Section 1
Human intelligence also abbreviated as HUMINT refers to the form of information obtained through interpersonal means as opposed to intelligence that is gathered through technical disciplines such as imagery intelligence, signal intelligence, and measurement and signature intelligence. Ideally, humans possess the cognitive abilities to form concepts, comprehend and learn techniques, apply logic, recognize patterns, solve problems, retain information, make decisions, and use language to communicate. As follows, human intelligence can be credited for uncovering terror attacks and detecting letter bombs. Infiltration of sleeper cells and terrorists groups by members of secret government intelligence services has seemingly helped counter-terrorism officials to obtain intelligence on planned activities and members of terrorist groups, which has subsequently been used to capture and execute leaders of renowned terrorist groups. For instance, in 1996, the Israel Security Agencies used a local contact to replace Yahya Ayyash’s phone with an explosive device with caused his death. Ayyash was among the top bomb maker of the terror group which was referred to as Hamas.[Hughbank, Richard J., and Don Githens. "Intelligence and Its Role in Protecting Against Terrorism." Journal of Strategic Security 3, no. 1 (2010): 31]
Sleeper cells primarily refer to a group of terrorist or spies that remain inactive within a particular population for a specified duration until ordered to act. Among the world’s largest terrorist groups and most dangerous jihadist army is the Islamic State (IS) formally known as the Islamic State of Iraq and Syria (ISIS). Abu Omar Al Zarqawi founded in the group in the year 2004 as a remnant of the Al Qaeda group in Iraq but following his death, Abu Omar Al Baghdadi become the new leader of the group. The group faded in 2007 after American troops’ invasion in Iraq and resurfaced in the year 2011 taking advantage of the growing instability in Syria and Iraq to carry out attacks. A recent review indicates that since its re-emergence, ISIS have fully operational branches in 18 countries namely, Iraq, Syria, Afghanistan, Pakistan, Saudi Arabia, Bangladesh, Tunisia, Libya, Indonesia, Egypt, Algeria, Mali, Nigeria, Yemen, Somalia, Philippines, Caucasus south of Russia, and Sinai Peninsula. The group has been involved in major terror attacks the world. For instance, in October 2015, the ISIS group based in Egypt killed 224 following the bombing of a Russian airplane. In the following month, November 13, in a series of coordinated attacks, the group killed 130 people and injured 300 in Paris. Most recently in 2016, a gunman who pledged allegiance to the group killed nearly 48 people at a night club in Orlando, Florida. These attacks can be accredited to the growing number of sleeper cells in regions where the group has established its base. ISIS militants in these regions are normally disguised as civilians who disseminate information to their assigned sleeper cells in the region. The issue of the increased sleeper cells is compounded by the fact that group is experiencing increased membership. Following the aforementioned background information on ISIS and increased sleeper cells, I saw the need to choose this group as the basis of the need to deploy human intelligence in order to solve the increasing number of terrorist attacks launched by the group.[Laub, Zachary, and Jonathan Masters. "The Islamic State in Iraq and Syria." Council on Foreign Relations 14 (2014).] [Ibid]
Human intelligence is specifically effective in combating terrorism. This is because strategic positioning of human intelligence will enable the government to obtain information on ISIS sleeper cells, impending attacks, and track movements of the group’s leaders, troops, and artillery. Together with government officials, both local and foreign, the intelligence can deliver terrorist to the right authorities for persecution. Intelligence will also be beneficial in uncovering the role of the group in attacks that have already taken place.[Koseli, Mutlu. "The Appropriate Use of Human Intelligence in Combating Terrorism." PhD diss., University of North Texas, 2003.]
Section 2
The Central Intelligence Agency (CIA) is among the renowned agencies that are deployed by the United Stated Federal government to fight terrorism globally. In particular, the CIA is a civilian intelligence service deployed to foreign countries with the objective of collecting, processing, and evaluating national security information through human intelligence. The group reports its activities to the Director of National Intelligence since the group is a member of the U.S intelligence community. Unlike other intelligence agencies, the CIA has political influence in foreign states, which is exerted through tactical divisions such as the Special Activities Division. Seemingly, the role of the CIA is far reaching to encompass cyber operations as conducted by the Information Operations Center, the agency’s largest division. The organization describes its main objectives as follows: countering terrorism activities, control of the dissemination and production of mass weapons of destruction such as nuclear weapons, informing the United States leaders of important developments in science, politics, and economics of overseas countries, cyber intelligence, and counterintelligence especially in Russia, China, Iran, and Cuba.[Hayden, Director Michael V. "Central Intelligence Agency." Comments he made on Policy toward Iran, to the United States Army War College Class of (2009).] [Ibid]
The mission statement underlying the objectives of the CIA is as follows: to ascertain definite threats, warn of impending attacks and preempt details of the attack, disrupt networks of terrorist groups, and conquer terrorist groups. The following participants who will work in conjunction with the CIA to achieve its mission statement will include: military officials, foreign partners, policymakers, and law enforcement and intelligence agencies. Military officials are an important asset in the war against terrorism owing to the fact the line between warfare and terrorism is fading gradually. As it is, terrorist groups are known for exacting mass casualties with the use of weapons of mass destruction subsequently causing great economic damage. Acts such as calls for the intervention of the military since the military is tasked with the protection of the state as well as the welfare of its citizen. Moreover, the act of counter-terrorism is seemingly incorporates the use of military techniques, tactics, and practices. This implies that input from trained and certified military officials is pertinent. Foreign partners refer to counter-terrorism and intelligence agencies from overseas countries that are involved in the fight against terrorist. Collaboration with foreign partners facilitates exchange of information of the state of security in overseas nations and underlying measures that have been implemented to counter terrorism. Policymakers are involved in the process of making and implementing policies within a government. In an organization, they have the authority to set the policy framework. This implies that policymakers are partly involved in guaranteeing the security of citizens, hence, they are in key in decision making process when insecurity arises. They are especially influential in making speedy decisions under great uncertainty. Law enforcers are the immediate source of help for locals whenever a security threat arises and their response to crisis within a locality is hasty; consequently, they should work together with the intelligence agency to guarantee the safety of the locals.[Hughes, Geraint. The Military's Role in Counterterrorism: Examples and Implications for Liberal Democracies. No. 48. Strategic Studies Institute, 2011.] [Müller, Cathérine, and Joppe de Ree. The Threat of Terrorism: The Perspective of a Policy-Maker. No. 3. Economics of Security Working Paper, 2009.] [Waxman, Matthew C. "Police and national security: American local law enforcement and counter-terrorism after 9/11." (2008).]
Section 3
The scenario at hand is that a certain terrorist group is planning an attack that will be launched by suicide bombers alongside the Arleigh Burke-Class Destroyer that will be docked at a certain harbor. Specifically, the terrorist are planning to conduct the attack on the same day a cruise ship ferrying 550 will dock. This information was determined by two clandestine human intelligence who were infiltrated in the organization two years back. This was following increased terror activities by the group a few months prior to their infiltration. The two were strategically infiltrated in a sleeper cell that was soon to be activated to...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Synthesis and Inquiry in Intelligence Collections
    Description: Resolution refers to the ability of the sensor to distinguish boundaries of objects through observing or measuring...
    2 pages/≈550 words| 1 Source | Turabian | Technology | Coursework |
Need a Custom Essay Written?
First time 15% Discount!