Strategies for Integrated Homeland Security Intelligence
Part 1: The primary objectives of counterintelligence and why it is important
- 1: The primary objectives of counterintelligence
The primary objective of counterintelligence is to disrupt foreign intelligence. Some of the approaches used have negative effects on governments since they violate the civil rights of the citizens and also manipulates the foreign affairs of other nations. Counterintelligence is the type of intelligence focused on a specific organization (Lowenthal, 2003). It is a passive activity that aims at spying on a state or government. Counterintelligence uses various approaches to stop or minimize the ability of other actors to get sensitive information from the targeted organization. Counterespionage is the type of counterintelligence that uses aggressive measures to get information from other nations hence breaking the laws set.
Counterespionage involves the use of spies to get important military and political information about a specific country. In essence, counterintelligence uses various tools to gather essential information that would be advantageous to the opponent (Lowenthal, 2003). The tools used include electronic eavesdropping, surveillance, interrogation, global positioning systems (GPS), moles, deception, double agents and extraordinary rendition. The type of technology used during counterintelligence activities can affect the methods of data collection used. While counterintelligence is advantageous to the opponent nation, some of the approaches used violate the laws set by the perceived nations.
- 2: The importance of counterintelligence to homeland security (HLS)
Counterintelligence aims at gaining information about the methods used by an opponent in collecting information related to the target country. Counterintelligence is an activity designed to collect important military and political information about an opponent nation. This information is later used against the target nation. In most cases, information related to counterintelligence goes against the rules of the target nation (Lowenthal, 2003). Counterintelligence is also used as a defensive strategy that prevents opponent’s intelligence against penetrating the target entity. As such, counterintelligence is used as an approach that prevents the intrusion of an opponent’s intelligence against matters concerning the target nation. Counterintelligence, in this case, acts in favor of the target nation; hence keeping the opponents in the dark.
Counterintelligence also acts as an offensive strategy that identifies the strategies used by opponents against the target nation. As such, the target state uses approaches focused on manipulating the opponent attacks by acting as a doubling agent or offering the wrong information (Lowenthal, 2003). These actions act to the benefit of the target nation while disadvantaging the opponent nation since it cannot possibly access the military or political information needed. In addition, this helps in reducing the negative effects associated with counterterrorism activities in the target nation such as the access of important and confidential information related to the government and the military.
Part 2: There are 18 fusion center guidelines as established by the department of justice. Select three of the guidelines and:
- 1: Clearly define and explain the significance of each guideline
The three guidelines are provided in the law enforcement and intelligence community intelligence framework known as “intelligence-led policing” that involves policing by the local, tribal and state law enforcement agencies. Policing in the tribal lines involves different ethnic groups that define a community (Joint publication 2-0: Joint intelligence, 2007). In this case, tribal leaders are mandated with collecting terrorist information in the grassroots and availing the same to the law enforcement agencies for action. When developing this strategy, the US government noted that there may be some elements within ethnic groups that pose danger to the common citizens. Since they are known among members of the societies, the government uses ethnic leaders to collect information regarding possible terrorist attacks in a bid to avert them.
In the local sphere, the government uses community leaders to collect information concerning threats to internal security. Such information can be collected by following individual criminal activity physically or in social media platforms such as Facebook and Twitter. These activities are focused on preventing possible attacks and threats to the security of the nation (National strategy for homeland security, 2007). At the state level, intelligence officers access information regarding possible terrorist threats to the country. Through this, the federal government creates increased awareness in the whole country. This is by identifying and locating terrorist activities and threats and sharing the same with other fusion centers around the country to increase vigilance by the security personnel.
- 2: How the three chosen guidelines relate to fusion center capabilities and management
The intelligence-led policing strategies developed aims at garnering intelligence information from the communities and citizens and understanding the trends associated with terrorist activities. By tapping information from the tribal, local and state functions, the federal government gets holistic information concerning the state of security in the whole country and also the various terrorist threats (The 9/11 Commission report, 2004).Through this information, the federal government is focused on recommending priorities for the tribal, local and state homeland security activities. As such, the government offers funds for the most important security problems in different locations. Also, the federal government aims at using a formal intelligence process focused on collecting crucial intelligence information within the locality and the nation at large. Besides, the federal government aims at analyzing and disseminating terrorist threats from various fusion centers spread across the US.
References
Joint publication 2-0: Joint intelligence. (2007, June 22). Retrieved on February 4, 2018, from the Federation of American Scientists Web site: http://fas.org/irp/doddir/dod/jp2_0.pdf
Lowenthal, M. (2003). Intelligence from secrets to policy. Washington D.C.: CQ.
National strategy for homeland security. (2007, October). Retrieved on February 4, 2018, from the Department of Homeland Security Web site: http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf
The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States (2004). New York: Norton.