Criminal Justice - Intelligence Does Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

The major participants in the Cuban Missile Crisis were in many ways driven by intelligence information to make the decisions upon which the crisis centered. The Soviet Union and its puppet nation Cuba relied on the heavy detail they received from their own agencies and believed that as a result of the failure and humiliation of the U.S. during the infamous Bay of Pigs incident that America would be blind at worst to its nuclear build up in Cuba and impotent at best. "At the time of the crisis, the United States possessed many more weapons than the Soviet Union, and thus had a military advantage. Khrushchev had formulated the plan...when he was searching for a place to install nuclear warheads that could not be detected by the U.S. early warning system..." ("Cuban Missile Crisis," 2002, p. 18) Simultaneously, the Americans both feared the Soviets and resented the clear violation of the nation's stated policy commonly known as The Monroe Doctrine which had initially intended to warn European powers from establishing colonies in the Western hemisphere.

The United States gathered intelligence information from U-2 spy planes which conducted reconnaissance flights over Soviet controlled Cuba and identified the construction of short and medium ranged missile silos that could be used for nuclear weapons. Tragically, the United States had failed for nearly two years to correctly identify the build up taking place so close to its own borders. But, it wasn't simply a matter of not knowing about the silos, it was a matter of not being willing to know. President Kennedy refused to know what many in the intelligence agency and in the larger world understood - the Soviets were building missile silos close to the United States. "Only when the CIA was able to deliver a picture to Kennedy was he ready to believe what everyone else knew." (Kaplan, 2002, p. 12) As a result, there were very few options left open to the American government once Kennedy had seen the photos. As a result of the information, the United States blockaded Cuba and refused to let any Soviet vessel near the island.

The blockade brought the U.S. And the U.S.S.R. To a critical stage. On the one hand, the Soviets scrambled to gather information about American strength in the region, American will to strike against the Soviets without sufficient provocation and to determine what other actions the communist empire could take. Conversely, the U.S. had to use intelligence gathering capabilities to assess the strength of the Russian fleet headed toward Cuba, to assemble information regarding the nature and readiness of the silos as well as determine what other threats were already installed on the Cuban isle.

The failure of both the Soviets and the Americans to know more information in advance of the crisis should be a significant model from which nations can learn. However, many of the lessons that were taught during the Cuban Missile Crisis were not learned as is evidenced by the failure of U.S. intelligence to predict or prepare for the attacks on 9/11/01. That lack of intelligence gathering capability was further demonstrated by the buildup to the U.S. war in Iraq in 2003 under the auspices of regime change due to the assumed possession of WMD by Saddam Hussein. But these examples are merely two of the most recent examples of the failure of intelligence agencies to accurately gather key information and provide that information with reliability to officials in government. In addition, these failures were not simply those of the United States but with respect to the attacks on 9/11 and the absence of WMD, many of the world's foremost intelligence agencies were similarly inadequate to the job of assessing the conditions that were presenting themselves. Therefore, it may be that the lessons that should be learned from an event of this nature are simply un-learnable and nations will be forced to repeat the tragedies that have occurred so often in the past.

4. How does cyber warfare threaten U.S. Homeland Security, and can it be countered effectively without an unacceptable sacrifice of U.S. civil liberties?

It is difficult to believe that the government could exercise such precision at countering cyber attacks against the United States and its interests that civil liberties would be completely spared. In fact, such a massive organization as the U.S. government appears virtually incapable of acting with the care and concern over personal freedoms that are of such importance to its people when the security of the nation is in question. Therefore, understanding the impact of cyber warfare on the responsibilities the U.S. Justice Department almost certainly foreshadows at least a temporary loss of some freedoms. The question then centers on the issue of the word "unacceptable" and what that implies with respect to combating cyber warfare and yet, there is at least a modicum of liberty that must be safeguarded if the nation is to preserve its most important precepts. Analyzing an example of a cyber warfare threat will help to answer the question regarding how homeland security can be safeguarded while at the same preserving at least a minimum level of civil liberties.

A sample scenario of cyber warfare involves an attack to personal and corporate computers that utilizes a hazardous virus designed to cause loss of service and to impact financial institutions and general productivity. An attack of this nature has happened on a smaller scale that has impacted individual companies or has attacked large groups of Internet "root servers" not only in the country but in different parts of the world. As a rule, most of these types of attacks are the work of disgruntled workers, miscreants and various delinquents. However, the fact that these types of individuals could carry out an attack that would impact millions of people simply underscores the serious nature of the threat posed by cyber warfare.

The threats presented by cyber warfare have a scale that is almost unimaginable. Virtually every aspect of the nation's security, finances, power grid and almost every other critical function are vulnerable to cyber attack. It is therefore reasonable to assume that terrorists would focus considerable energy on attacking one or more of these functions through the release of a virus or some other digital parasite that is capable of either causing massive failure or irreparable damage.

Combating threats posed by terrorist organizations that have designs on damaging the computer infrastructure and capability of the U.S. necessarily encroaches on the individual freedoms that most Americans deem as inseparable from their personal identity. One such action taken by the government to prevent cyber warfare attacks involves the monitoring of specific websites that adhere to anti-American ideology. This monitoring involves tracking names and statements made by members of such sites and evaluating whether such activity poses a potential threat. Similar actions could be taken by the government to essentially create "sting" websites that would voice anti-American rhetoric and track individuals who join to determine if they have detrimental plans in mind for the United States or its citizenry.

Again, the question that naturally occurs from an examination of such governmental activities is one of "acceptability." Whether or not an action restricts the freedom of association and the right to free speech because those associations and speech are monitored is a question about which intelligent people could disagree. Thus, the action taken by the government once in possession of the information that results from monitoring is perhaps a better measure of the "acceptability" of monitoring or "sting" actions.


Cuban Missile Crisis. (2002). Cuban Missile Crisis. Politics & World Affairs: Cold War, 18.

In Defense of Civil Liberties (2004, September 20). The New York Times, p. A24.

Kaplan, Morton A. (2002). Intelligence Failures. World & I, 17, 12.

U.S. Has "No Objections" to China's Nuclear Buildup (2001). The New American, 17, 13.

Criminal Justice - Intelligence[continue]

Cite This Term Paper:

"Criminal Justice - Intelligence Does" (2005, February 15) Retrieved December 10, 2016, from

"Criminal Justice - Intelligence Does" 15 February 2005. Web.10 December. 2016. <>

"Criminal Justice - Intelligence Does", 15 February 2005, Accessed.10 December. 2016,

Other Documents Pertaining To This Topic

  • Criminal Justice Trends the Trends of the

    Criminal Justice Trends The trends of the past, present and future that outline the borders connecting the criminal justice system components and their links adjoining the society is, beyond doubt, an authentic relationship that the law and society have established. Criminal justice has been affected by various trends in the times gone by. This is because trends keep changing with the passage of time. Therefore, it is exceedingly important for the

  • Criminal Justice System Normally Refers to the

    Criminal justice system normally refers to the compilation of the prevailing federal; state accompanied by the local public agencies those pacts with the crime problem. These corresponding agencies procedure suspects, defendants accompanied by the convicted offenders and are normally mutually dependent insofar as the prevailing decisions of the single agency influence other supplementary agencies (Cole & Smith, 2009). The fundamental framework of the underlying system is normally granted through the

  • Criminal Justice System Juvenile Delinquency

    For example, Cook County, IL, has built a network of support for juvenile female offenders within the local community. The county has developed its own gender-specific assessment and treatment guidelines and has trained youth-facing community workers on assessing juvenile offenders and recommending programming. (Juvenile Justice Journal, 1999, p. 30). Also, the county designed a pilot network of social service agencies in order to provide a community-based continuum of care. (Juvenile

  • Criminal Justice System

    Criminal justice system is comprised of elaborate pieces of a huge puzzle. The age of "Order," CSI, and various other TV programs has actually all however removed the genuine components of the puzzle that bring about the arrest of the suspect. Prior to being employed, one is enlightened on how this works; he ought to be warned of the jobs that everyone plays and at exactly what phase they are

  • Criminal Procedure The Criminal Justice

    D.). Armed robbery is an offense carried out while in possession of a drawn weapon like gun despite of whether it was fired or not. Plea negotiation or bargaining is usually conducted in order to lessen trial expense and involves the provision of a lesser sentence by the prosecutor in exchange for admission of guilt. Pre-trial conference involves discussions between the defense, prosecutor, and judge to ascertain the need for

  • Criminal Justice Administration the Criminal Justice System

    Criminal Justice Administration The criminal justice system involves practices and institutions directed by governments in place to ensure that social control is upheld, crime mitigation and deterring or going ahead to sanction those that are in violation of laws through criminal penalties and rehabilitating the same time those who have been accused of any crime are protected against abuse of the powers to investigate or prosecute them. The paper will

  • Criminal Justice Policies Criminal Justice

    Other Implications If the issue of pant sagging is not addressed, it will lead to public dissatisfaction, especially from people who have raised concerns. It will also continue the implications on black men as being disrespectful gangsters, or as Cosby says (middle class blacks who are disrespected and despised gangsters, whose egregious behavior is sagging pants). It will also continue the implication that the black represent some unified community which is

Read Full Term Paper
Copyright 2016 . All Rights Reserved