Research Paper

Foreign and Domestic Intelligence research paper (5-7 pages) APA 7 format

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

2 documents are uploaded as references.

Make sure to give an example of threats for domestic and international. The tools that agencies use to identify, protect, detect, respond, and recover.  

DomesticIntelligence

Domestic Intelligence was created in 1908. After the September 2001, attacks there was a shift in a different direction. Their mission is to collect, analyze, and deliver foreign intelligence and counterintelligence information to America’s leaders so they can make sound decisions to protect our country. The president, law enforcement, policy makers, and the military are the customers.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Domestic intelligence is a term for efforts by a government to obtain information about activities that pose an actual or putative threat to internal security. In authoritarian or totalitarian regimes, domestic intelligence-gathering by the government is a regular part of daily life. Americans raised fear after they became known due the United States domestic intelligence programs of the post-World War II. Many Americans and Europeans put aside fears of government surveillance in favor of a new demand for heightened security.

From 1930’s to 1960’s, the Federal Bureau of Investigation (FBI) focused on cases of foreign subversion and espionage. the church committee investigation of intelligence abuses in the 1970’s disclosed a series of FBI- along with Central Intelligence Agency (CIA) and (NSA)- violations of American’s civil liberties. Congress passed a series of reform laws in the late 1970’s including the Foreign Intelligence Surveillance Act (FISA), to prevent future abuse.

1970’s information about massive domestic intelligence programs became known. Shamrock which involved the interception of telegrams and other forms of communication between 1945 and 1975. Another domestic intelligence/ surveillance program, chaos, the FBI monitored Vietnam War protestors between 1967 and 1972, looking for ties to the Soviets Revelation of these and other activities became known in the wake of the Watergate Scandal, which influenced an attitude among some citizens of suspicion toward the government. The resulting “wall” of bureaucratic obstacles virtually halted the flow of intelligence information provided to domestic law enforcement agencies. The 9/11 Commission highlighted this sort coming as a major impediment to National Security.

During 2002, the U.S. executive legislative branches debated the question of which agency should handle a new domestic intelligence effort. The FBI formally in charge of counter terrorism or the CIA. The FBI and the CIA would work together in the new unit.

Unlike many nations, the United States does not have a dedicated organization focused on domestic intelligence collection. Although the FBI is the principal domestic intelligence agency, the CIA and DOD, also play limited domestic intelligence roles.

FBI’S Important Role

Although the FBI is the lead agency for domestic intelligence, many other organizations within the government contribute to the collection, analysis, and processing of domestic intelligence. The Department of Homeland Security (DHS) is responsible for sifting through, packaging, disseminating intelligence, and analyzing based on information collected by DHS component agencies. I&A also integrate with the broader intelligence community and uses DHS links to state, local, and private sector partners to share information about potential threats.

DHS is superior with borders, and security. They are not superior with themselves. If complainants keep piling up on them than the FBI takes the final role and has a more powerful authority. (https://www.quora.com)

Since 2005, the FBI intelligence is co-located within the National counterterrorism center. IN 2002 the DOD established the Counter Intelligence Field Activity. (CIFA)

The USA Patriot Act and amendments to the Foreign Intelligence Surveillance Act provided our counterterrorism community with enhanced investigative authorities. We recognized our intelligence, law enforcement, and counterterrorism communities to enable them to function more effectively as a whole.

Each step has transformed law enforcement. They are a more effective counterterrorism tool that can be used preemptively, before ay attacks or bombs occur. Because law enforcement remains bound by our laws and constitution there will always be checks on the use of these law enforcement tools. This will ensure they remain consistent with our values and laws. This does not mean their work is done.

Even though they capture and arrest many they take a chance as what might happen in the future. When arresting a terrorist, they balance four critical national security objectives. They disrupt the terrorist-related activity, gather any intelligence the individual may have that can enable us to identify and disrupt additional plots against the U.S., protect the intelligence, including sources and methods, which allowed us to disrupt and identify that individual and his activities, last when the individual possess an enduring threat, provide for the sustainable incapacitation of the individual. Our core principles and values must guide our every step. If not, there can be tension between the objectives at times.

Court’s Approach

Our federal courts are unrivaled when it comes to incapacitating dangerous terrorist. Some argue that the military commissions inherently more effective, therefore it is believed to be more appropriate for trying suspected terrorists. In some cases, there are some advantages of military commissions. Greater flexibility to admit hearsay evidence. Even if there is a no Miranda warning issued confessions can be introduced. They must be reliable or voluntary except if limited circumstances.

We were able to bring the military commission system in line with the rule of law and with our values. This was because the reforms passed by congress. Both the federal court and military can be used to disrupt terrorist’s activities and plots, to gather intelligence and to incapacitate them through prosecution.

No case has caused more controversy as Umar Faruq Abdulmutallab. They were charged with trying to blow up a plane over Detroit. The leverage and flexibility that the criminal justice system supplies to gather intelligence, through proffers and plea agreements, before and after arrests. In some cases, even after conviction or sentencing is undeniable. The evolution that began following the 9/11 attacks continues combating terrorism requires a flexible, practical, results-driven approach that is consistent with our values and laws. It has unquestioned legitimacy, demonstrated unrivaled effectiveness, and the flexibility to protect and preserve the full spectrum of our national security objectives. A political transformation is underway in many parts of the Middle East.

Democracies tend to centralize their domestic security functions in response to major terrorism threats. In federal sates one of the first ‘victims’ of exigencies and crises is the principle of federalism. Activities and terrorist networks tend to span geographic areas and legal jurisdictions. This complicates sharing of information and coordinating preventive activities. It makes for many challenges within an institutionally fragmented system.

Abstract: At the present time, the United States encounters threats coming from multiple organizations, individuals as well as countries globally. Intelligence is basically utilized in ensuring these threats are mitigated. The summary discusses the ones considered to be at the front line of the United States Intelligence Community who are mainly the Central Intelligence Agency (CIA) as well as the National Security Agency (NSA).

Background: The CIA was formally created in 1947 to help counter the Soviet threat, which was a response to Pearl Harbor during World War II. Previous U.S. intelligence and counterintelligence efforts had been conducted by the military and the Federal Bureau of Investigation (FBI) and suffered from duplication, competition, and lack of coordination, problems that continued, to some degree, into the 21st century. On the year of 1952, NSA by President Harry S. Truman. The NSA was created in part out of the belief that the importance and distinct character of communications intelligence warranted an organization distinct from both the armed forces and the other intelligence agencies.

Discussions: Both agencies play the role of gathering intelligence that is foreign in order to inform as well as alert the given government regarding the motivations, activities, intentions in addition to capabilities of the entities that are foreign making attempts to undermine the national security as well as prosperity. The foreign intelligence gets to respond to the intelligence priorities of the government that happen to be at by the cabinet.

Within the CIA as well as the NSA, the hackers of the government in a secretive manner tend to gather as well as store the flaws of software which they end up exploiting later on in order to cause damage or spy on the adversaries of America. However, the same said weaknesses are capable of being turned against any given machine in addition to them being very complex to control immediately they are loosed on the net. Additionally, of late, the government of the United States has ended up proving itself not able to make sure that its own cyber weapons are secure.

The Petya as well as the WannaCry attacks are known for exploiting weaknesses that were made to be public by a given group that is identified as the Shadow Brokers, which ended up releasing them for the time in 2016. It is not well elaborated the manner in which the flaws of the software got to be stolen from the possession of the NSA. This was later on followed by a breach at the CIA that WikiLeaks made claims that it had acquired a trove belonging to the hacking tools of CIA after the known vaunted agency of spy lost control regarding its whole cyber weapons arsenal. This is considered to have the probability of being an overstatement that was made by WikiLeaks, however, a substantial figure in relation to the techniques are considered to have been made public, and till now no single individual has been able to explain the manner in which it occurred or the action that was taken in preventing the same occurrence from taking place again. These thefts end up leaving the spy agencies within positions that are said to be untenable.

Recommendations: For the United States to ensure it safeguards itself and also continues being a global leader, the nation is required to develop as well as consistently refine counterterrorism policies that are sound and suitable to the world that is changing rapidly.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP