Unit 4 – Discussion Board View Assignment Details for Unit 4 Assignment Overvi

Unit 4 – Discussion Board
View Assignment Details for Unit 4
Assignment Overview
Type: Discussion Board
Unit: Intelligence Collection and Processing and Relation to the State & Local Levels
Deliverable Length: 400-600 words (less than 10 percent similarity score)
Assignment Descriiption
Assignment Objectives
Assess the Intelligence Community’s (IC) capabilities and limitations.
Primary Task Response: Your first task is to post your own Key Assignment Outline to the Discussion Board so that other students are able to review your plan. Attach your document to the main post, and include any notes that you feel are appropriate. The purpose of this assignment is to help improve the quality of the Key Assignment Draft you will complete next week.
Part 1
Open-source intelligence (OSINT) is all information that can be acquired from overt collection from all types of media and government reports, various organizations, and through the use of the Internet. Discuss the following:
What are the pros and cons of OSINT?
Include a short assessment of how OSINT relates to other sources of intelligence, such as human intelligence (HUMINT), signal intelligence (SIGINT), image intelligence (IMINT), and measurements and signature intelligence (MASINT).
Part 2
The ever-expanding intelligence community (IC) includes many new disciplines other than law enforcement, such as fire and emergency medical services (EMS). Discuss the following:
Define what the emerging IC means to you.
Select 2 homeland security (HLS) and public safety disciplines, and explain how those disciplines can play a role within the emerging IC and overall information sharing.
Discuss the emerging IC as it relates to a multidiscipline approach.
Are there expanding intelligence needs? If so, in what areas?
Part 3 create an outline of your information:
For assistance with your assignment, please use the following reference and course materials.
Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence
by Hassan, Nihad A; Hijazi, Rami
Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence
by Hassan, Nihad A; Hijazi, Rami
Seduced by secrecy – perplexed by complexity: effects of secret vs open-source on intelligence credibility and analytic confidence
by Pedersen, Tore; Jansen, Pia Therese
The Tao of Open Source Intelligence
by Bertram, Stewart; Silverleaf, Peter
Open Source Intelligence for Malicious Behavior Discovery and Interpretation
by Huang, Yi-Ting; Lin, Chi Yu; Guo, Ying-REN ; Lo, Kai-Chieh; Sun, Yeali S; Chen, Meng Chang
(EXAMPLE of Completed Work for Reference)
Part 1 Open Source Intelligence
Although not regarded as the most efficient and the most effective way to gather intelligence and achieve mission success, open source intelligence is a very important way to gather information either for mission planning or threat mitigation against the United States or its allies. The military and other intelligence agencies in the Intelligence Community have been known to scour social media and other places on the internet to obtain information about certain adversaries. Below are the pros and cons of open source intelligence.
Pros:
Checking websites of adversaries whether they are foreign or domestic, could sometimes provide a notification of a gathering.
Websites and social media can also provide information as to if an organization is looking to recruit new members. Sometimes the websites will provide information as to where and when a meet up will be.
Utilizing government reports can help the individual researching a particular group establish a pattern of behavior or help understand their tactics, techniques, and procedures that could potentially mitigate a threat.
Cons:
Information obtained from open source intelligence can be purposely created to be false. This could lead to threat mitigating forces being placed in the wrong location to deter a threat.
Open source intelligence is fluid. This means that the information provided by a website or a government report could be wrong due to an adversary changing their patterns of behavior or their tactics, techniques, and procedures.
Short Assessment
In relation to the other tenets of intelligence, open source is a useful source to compare what an organization has gathered up against the other tenets. Although this will not prove that the information is 100% true, it does provide a feeling that the information could not be placed to be misleading. An example of this could be if an organization has acquired information about an adversary and has a good source for human intelligence, they can run the newly acquired information up against their source.
Part 2 Expanding Intelligence Community
The ever-expanding intelligence has been ever evolving. This evolution means that the intelligence community is able mitigate threats by being able to obtain more real time intelligence to protect against adversaries. The development of new technology adds as a force multiplier for all tenets of intelligence doctrine.
Two Homeland Security and public safety disciplines that play large role in the evolving intelligence community are law enforcement and cyber security/information technology. The way that it impacts the two is that, emerging technology can help prevent the loss of life of law enforcement officers and mitigate hacking from any adversary. One potential piece of technology that could prevent the loss of life of law enforcement could be robots that augment the police force in potentially dangerous situations. The way that evolving technology could improve cyber security and information technology is that information sharing among agencies and allies could improve, which could lead to more threats being eliminated or mitigated.
All of the current intelligence disciplines stand to gain from the intelligence community’s evolution. Technology advancements will help the individuals that utilize each discipline to better assess threats and hopefully deter them.
There will always be an expanding need for intelligence needs, due to the fact that the enemy will either change their tactic, techniques, and procedures or behavioral patterns as to how they operate. Since there are enemies that attempt to carry out attacks both kinetically and in the cyber realm, it is important that the evolution of the intelligence community happens across all disciplines of intelligence.
(EXAMPLE OF OUTLINE FOR REFERENCE)
Key Assignment Outline
Part One:
Memo:
Information sharing legal barriers
Freedom of information laws
Anti-trust rules
Agency sharing policies
Decision-making products
Informed decision-making process
Information sharing strategy barriers
Agency culture barriers
Agency sharing policies
Identified information-sharing barriers
Agency culture and policy barriers
The identified barriers mitigation plan
New information sharing policy
Change agency sharing culture
Information sharing strategy and global structure
Encourages greater information sharing and collaboration throughout the IC
Part Two:
Executive Summary
Goals and Objectives
Goals: Establish a new culture of intelligence sharing throughout the IC
Objectives: Maximize the availability and access to information by enhancing collaboration through policy creation.
Pros and Cons of Goals and Objectives
Pros: Establishes uniform policies for sharing, creates a universal system for accessing intelligence throughout the IC
Cons: Can be a complex process, the universal system could be costly, would require the full participation and cooperation of the entire IC
Recommendations
Outline milestones
Dedicate resources
Set timeline
Begin implementation
Part Three:
Strategy Descriiption
Agency and descriiption:
The Office of the Director of National Intelligence (ODNI) is the head of the intelligence community. The agency ensures that intelligence is provided to the President and other government organizations quickly.
Goals:
To improve collaboration between government agencies and other entities
Create a new culture that normalizes information and intelligence sharing amongst these organizations.
Structure and capabilities
Independent agency within the IC
Provides oversight for the IC
Staffed by officers from across the IC
Information sharing barriers
Agency culture
Agency sharing practices
Policies within the strategy
Write for Release Policy
Legal entities and barriers
Director of National Intelligence
Anti-trust policies
Agency specific sharing policies
Ethical and privacy considerations
Keep identities safe
Prevent privacy invasion
Keep data safe
Minimize data breaches
The intelligence cycle
Direction
Collection
Processing
Exploitation
Dissemination
Integration coordination
The ODNI
Department of Defense
References
Carter, D. (2009). Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition. www.iafc.org/iCHIEFS/iCHIEFS-article/intelligence-the-role-of-the-fire-service.
Dillion, D. (2002). Breaking Down Intelligence Barriers for Homeland Security. www.heritage.org/homeland-security/report/breaking-down-intelligence-barriers-homeland-security.
Information Sharing Strategy. (2008). www.dni.gov/files/documents/Newsroom/Reports%20and%20Pubs/IC_Information_Sharing_Strategy.pdf.
Multi-Discipline Intelligence Analysis. (n.d.). https://ext.sharepoint.ctc.com/ctcComContent/StageMedia/WCCD4U/Multi_IA.pdf.
Nairn, J. (2012). What are the Disciplines of Homeland Security? www.homelandsecurityroundtable.com/2012/07/02/what-disciplines-associated-homeland-security/.

Post navigation

Leave a Reply

Your email address will not be published.