Filter Results By:

Reset Filters

We have over 1000 essays for "Intelligence Agencies"

View Full Essay

Issues Faced by Open Source Intelligence

Words: 1242 Length: 4 Pages Document Type: Essay Paper #: 83006594

Big Data is driving virtually every industry in today’s Digital Age, including, among all others, the work of the Intelligence community. From human intelligence (HUMINT) to open source intelligence (OSINT), “strategic intelligence as a professional discipline and force multiplier” has evolved from centering on “qualitative subject-matter content analyzed by human specialists” to leveraging “the increasingly massive collection and machine analysis of quantifiable, if not necessarily quantitative, data.”[footnoteRef:2] However, as Richard Best, Specialist in National Defense, Foreign Affairs, Defense and Trade Division, testified before Congress in 2006, OSINT, which is primarily derived from old and new media publications, including social media, lacks a systematic manner in which such data can be incorporated into or used to supplement classified information.[footnoteRef:3] As Best notes, “a consensus now exists that OSINT must be systematically collected and should constitute an essential component of analytical products.”[footnoteRef:4] The main challenge is that among the community itself,…… [Read More]

Best, Richard. Open Source Intelligence (OSINT): Issues for Congress. Washington, DC, 2007.
Lim, Kevjn. \\"Big data and strategic intelligence.\\" Intelligence and National Security 31, no. 4 (2016): 619-635.
Lowenthal, Mark M., and Robert M. Clark, eds. The five disciplines of intelligence collection. Sage, 2015.
Zegart, Amy B. \\"September 11 and the adaptation failure of US intelligence agencies.\\"  International Security 29, no. 4 (2005): 78-111.
Zegart and Stephen D. Krasner, eds. “Pragmatic Engagement amidst Global Uncertainty: Three Major Challenges,” Hoover Institution, 2015.
View Full Essay

Is it Time for a Domestic Intelligence Agency in the United States

Words: 3243 Length: 10 Pages Document Type: Research Paper Paper #: 25518633

Domestic Intelligence Agency

The Necessity of Establishing a New Domestic Intelligence Agency

In response to a call for a new Domestic Intelligence Agency, the FI National Press Office released a statement in 2006 that indicated the strides the ureau had made in "becoming" an "intelligence-driven organization" since 9/11.

The letter's intent was to show the illogicality of those wishing to "tear apart the ureau" in order to "start a new agency." As Assistant Director of the FI, John Miller asked, "How long would it take this new agency to get rolling? A year? Two? What would it use for a database? How would it address privacy and civil liberties? How long would it take the officers of this new agency to develop trusting relationships with America's 18,000 local law enforcement agencies?"

Miller's questions were both pertinent and revealing of precisely what a successful Domestic Intelligence Agency would require. Even the…… [Read More]


Burch, James. "A Domestic Intelligence Agency for the United States? A Comparative

Analysis of Domestic Intelligence Agencies and Their Implications for Homeland Security, Homeland Security Affairs 3, No. 2 (June 2007).

CNN. "U.S. policymakers mull creation of domestic intelligence agency,, Oct

20, 2008,  / (accessed July 8, 2013).
View Full Essay

Central Intelligence Agency Cia Its Creation and

Words: 3902 Length: 12 Pages Document Type: Essay Paper #: 37654514

Central Intelligence Agency (CIA), its creation and the different roles it plays. The duties of the Director of the Central Intelligence Agency (CIA) are also highlighted in the paper. The paper also highlights the Intelligence eform Act of 2004 and the amendments that were made after the date of enactment. Lastly, the paper discusses the major components of the Central Intelligence Agency (CIA) and the roles played by them in order to guarantee the efficient running of the Central Intelligence Agency (CIA).

Central Intelligence Agency

The CIA is an independent agency, whose functions are not disrupted by the United States government without any necessity. This agency is dedicated towards providing national security intelligence to the senior policy makers of the United States of America. ("CIA vision, mission," 2013)

The Central Intelligence Agency, (CIA), is responsible for collecting and analyzing information in relation to the plans and strategies of the enemies…… [Read More]


About CIA. (2013, January 10). Retrieved from /about-cia/index.html" target="_blank" REL="NOFOLLOW">
View Full Essay

Central Intelligence Agency the Civilian Intelligence Agency

Words: 1636 Length: 5 Pages Document Type: Essay Paper #: 58341857

Central Intelligence Agency

The civilian intelligence agency of United States has given the name of the Central Intelligence Agency (CIA). The fundamental objective of this agency is to collect, assess and publicize foreign intelligence that provides national security intelligence assessment to the senior United States policy makers. The CIA is also involved in secret agenda at the request of President of United States.[footnoteRef:1]The establishment of CIA was in succession of the Office of Strategic Service (OSS) being operative in World War II. [1: Caroline Wilbert. "How the CIA Works." Available from; accessed Aug 3rd 2011]

On the government side CIA works fundamentally with the House Permanent select Committee on Intelligence and the Senate Select Committee on Intelligence. These two committees and the Foreign Relations, Foreign Affairs and Armed Services committee are responsible to authorize the CIA's program and oversee the CIA. The funding and budgeting system of the CIA…… [Read More]


Wilbert, Caroline,: How the CIA works," Available at . Internet; accessed 3rd August 2011

Kent, Sherman, "Kent Centers Occasional Papers 2004." Available at /library/kent-center-occasional-papers/pdf/OPV3No1.pdf" target="_blank" REL="NOFOLLOW">
View Full Essay

National Geospatial Intelligence Agency

Words: 2177 Length: 7 Pages Document Type: Essay Paper #: 79605339

2003, when the National Geospatial-Intelligence Agency (NGA) was instituted, the concept of geospatial intelligence (GEOINT) was largely at its outset. Its beginnings had been propagated in preceding decades, but the circumstances were finally prime for the discipline to develop, grow and spring new branches with the ability to support a growing community practicing a verified dexterity.[footnoteef:1] In delineation, geospatial intelligence takes into account taking advantage of and analyzing images and geospatial information to outline, appraise, and visually portray physical features and geographically mentioned activities on Earth. This is purposed to distinguish the important property of geographical position linked with the data that the National Geospatial Intelligence Agency and the intelligence community generate and analyze. It is also purposed to lay emphasis on the value-added examinations that the NGA undertakes to generate a specific kind of actionable intelligence.[footnoteef:2] Taking into consideration that the purpose of geospatial intelligence is to pinpoint and…… [Read More]


Alderton, Matt. "The Defining Decade of GEOINT." Trajectory, 2014.

Buxbaum, Peter. "Geospatial's Big Data Challenge." Intelligence Geospatial Forum, 2015.

Flint, Colin. Introduction to geopolitics. Routledge, 2016.

Mapping Science Committee. New research directions for the national geospatial-intelligence agency. National Academies Press, 2010.
View Full Essay

Central Intelligence Agency and Its Purpose

Words: 629 Length: 2 Pages Document Type: Essay Paper #: 77324291

Central Intelligence Agency (CIA) was founded in1947 out of the Office of Strategic Services, or OSS, and its purpose was to act as a civilian foreign intelligence agency that dealt with threats to American interests abroad. hile initially born at the onset of the Cold ar era in which espionage and the threat of nuclear war was high, the CIA has developed over the years to be something more than its initial mandate set out. By participating in various black operations geared towards effecting regime change, the CIA quickly became known as a cloak and dagger agency very much in the tradition of the OSS.

The organizational structure of the CIA is situated in five directorates, all of which help to coordinate intelligence: the Directorate of Digital Innovation, of Analysis, of Operations, of Support, and of Science and Technology. The Director of the CIA oversees all of these directorates and…… [Read More]

Works Cited

Tyler, Patrick. A World of Trouble: The White House and the Middle East. NY: Farrar,

Straus and Giroux, 2010. Print.

Weiner, Tim. Legacy of Ashes: The History of the CIA. NY: Anchor Books, 2008.

View Full Essay

Intelligence Community Reform Since the

Words: 3351 Length: 9 Pages Document Type: Research Paper Paper #: 61555606

After September 11th, President ush authorized the use of water boarding, as a way to gain knowledge of terrorist groups and their activities. The problem is that many of the civil rights-based groups believe that this is in violation of American law. When the people, who are interrogated (terrorists), are not American citizens and they want to do as much harm to the country as possible. Given the fact that these individuals, are more than likely hard core terrorists and posses knowledge about imminent terrorist activities, meant that the this technique would be utilized to obtain information. Even though this was successful and was used on limited number of people, the press and Congress continued to debate the issue. (Froomkin, 2010) This is troubling, because it undermines the activities of U.S. intelligence officials (who are trying to protect the nation). As they are inserted into a game of political chicken,…… [Read More]


Congressional Reports. (2004). Go Access to Congress. Retrieved from:

Five Bombshells from Wiki Leaks Iraq War Documents. (2010). Christian Science Monitor. Retrieved from: 

Key Provisions. (2004). CNN. Retrieved from:

Overall U.S. Intelligence Budget Tops $80 Billion. (2010). LA Times. Retrieved from:
View Full Essay

Intelligence After World War II

Words: 1340 Length: 4 Pages Document Type: Term Paper Paper #: 49884855


It was also a pivotal tool in discovering the ussian nuclear missile sites that sparked the Cuban Missile Crisis in 1962. The U.S. also gained spy satellites in 1960, and combined with the U-2 and other tools, American technological superiority began to assert itself. The spy satellites were a direct result of rocketry experimentation during and after World War II, and many German rocket scientists transplanted to America helped create the rockets that would launch the satellites. The scope of the intelligence operations was growing, and so were the technological advances that helped the agencies grow and learn more every day.

There are many who believe that factors such as the Cold War may help develop new agencies, but they have little to do with how the agencies evolve. Author Zegat continues, "The truth is that international factors such as the onset of the Cold War may catalyze the…… [Read More]


Andres, Christopher. For the President's Eyes Only. (New York: HarperPerennial), 1996.

Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century. New York: Doubleday, 2001.

Painter, David S. The Cold War: An International History. London: Routledge, 1999.

Powers, Thomas. Intelligence Wars: American Secret History from Hitler to al-Qaeda. New York: New York Review Books, 2002.
View Full Essay

Intelligence and Politics Origins and

Words: 2906 Length: 9 Pages Document Type: Book Review Paper #: 77948109

Franks (along with the Bush war cabinet, including Vice President Dick Chaney) "met repeatedly" to plan the attack on Iraq. It was groupthink through and through. At the same time Bush was saying publicly he was "pursuing a diplomatic solution" (Hamilton, 2004), "intensive war planning" was going on during the whole year 2002. It "created its own momentum" in the administration, Hamilton wrote.

In oodward's book, which was recognized as conveying authentic details about the Bush war planning and strategies, he covers much of the pre-war discussions Bush had with top members of his administration, along with decisions Bush made on his own and with help from people like his Foreign Policy Advisor, Condoleezza Rice. But according to an excerpt from oodward's book, Bush waited until the last minute (among his top staff) to brief Secretary of State Colin Powell, who had not been an advocate of going to war,…… [Read More]

Works Cited

Bar-Joseph, Uri, and Levy, Jack S. 2009, 'Conscious Action and Intelligence Failure', Political Science Quarterly, vol. 124, no. 3, pp. 461-489.

Bar-Joseph, Uri. 1995, Intelligence Intervention in the Politics of Democratic States: The United States, Israel, and Britain. The Pennsylvania State University Press, University Park, Pennsylvania.

Gentry, John a. 2008, 'Intelligence Failure Reframed', Political Science Quarterly, vol. 123, no. 2, pp. 247-260.

Hamilton, William. 2004. 'Bush Began to Plan War Three Months After 9/11.' Washington Post, April 17, 2004, p. A01.
View Full Essay

Intelligence Unit Memo Police Chief I B Friendly

Words: 1120 Length: 3 Pages Document Type: Essay Paper #: 82796390

Intelligence Unit Memo

Police Chief I.B. Friendly

Incorporating Intelligence Unit into Department

In modern law enforcement, the sophistication of modern criminal activity, particularly post-September 11th, causes a necessary paradigm shift for 21st century police departments. This shift requires that departments rethink the power of information -- the manner in which it is collected, analyzed, and then used to fulfill the goals of the department. In fact, in 2007, the National Strategy for Information Sharing released by the hite House describes the need for fusion information centers as a vital way to succeed in modern law enforcement and critical to the safety of the local community as well as the nation (Porter, 2008).

Historical Background - Prior to 1960, even large, urban Police Departments did not have intelligence units. Resources were combined so that Detectives were at the hierarchy of information analysis; and every member of the department was open to…… [Read More]

Works Cited

Corrections - Report of the National Advisory Commission on Criminal Justice Standards and Goals. (1973, March). Retrieved from 

Federal Bureau of Investigation. (2011, June). Integrated Automated Fingerprint Identification System. Retrieved from
View Full Essay

Intelligence the Success of U S

Words: 339 Length: 1 Pages Document Type: Term Paper Paper #: 55558986

This flexibility gave U.S. intelligence agencies an advantage over their Soviet counterparts, who were unable to demonstrate a similar capacity for rapid and effective responses to the circumstances of the crisis ("Intelligence in the Cuban Missile Crisis"). Finally, and most surprisingly, the U.S. intelligence community retained a remarkable ability to take actions that were not heavily influenced by the political climate of the nation. Rather than being influenced by the political platforms of politicians, the intelligence community focused on the matter at hand, to great effect ("Intelligence in the Cuban Missile Crisis"). These three factors were most influential in the successful actions of the U.S. intelligence community during the Cuban Missile Crisis.

orks Cited

Intelligence and the Cuban Missile Crisis." The atson Institute for International Studies. 1998. 15 Oct. 2007

Intelligence in the Cuban Missile Crisis." Everything2. 23 Feb. 2006. 15 Oct. 2007… [Read More]

Works Cited

Intelligence and the Cuban Missile Crisis." The Watson Institute for International Studies. 1998. 15 Oct. 2007

Intelligence in the Cuban Missile Crisis." Everything2. 23 Feb. 2006. 15 Oct. 2007 .
View Full Essay

Intelligence the Creation and Performance

Words: 364 Length: 1 Pages Document Type: Term Paper Paper #: 5903504

By 1945, the OSS was abolished and by 1947 the National Security Act had completely transferred the task of espionage and intelligence from military to civilian hands ("United States Intelligence"). This transfer set the stage for the successes and failures of the U.S. intelligence community during the early Cold ar. It meant that U.S. intelligence was much more greatly coordinated and more aggressively implemented during that period to some apparent success. But it also meant that these new civilian agencies did not have the legacy of experience with espionage that existed within the military intelligence community. The end result was a higher degree of coordination during the early Cold ar, which improved the level of intelligence and communication and helped create the U.S.'s first true intelligence community.

orks Cited

United States Intelligence, History." Espionage Information: Encyclopedia of Espionage, Intelligence, and Security. 2007. 4 Oct. 2007… [Read More]

Works Cited

United States Intelligence, History." Espionage Information: Encyclopedia of Espionage, Intelligence, and Security. 2007. 4 Oct. 2007 .
View Full Essay

Intelligence Community A History of

Words: 3041 Length: 9 Pages Document Type: Thesis Paper #: 54262272

This would create a reactionary agency which, rather than gathering intelligence to the extension of its security, would approach what would come to be known as the 'containment theory,' using whatever resources and tactics were at its disposal to deflect against the spread of communism.

At its time, the 1947 Act would be seen as projecting considerable vision. As one conservative think-tank reports on this idea, "until fairly recently, CIA considered its appropriate time horizon to be fairly long. It was, I believe, generally longer than the focus of either the Defense Intelligence Agency or the State Department's Bureau of Intelligence and Research (INR). The Directorate of Intelligence made forecasts in some areas that went out 20 years, and collectors and analysts tried to anticipate events 'over the horizon' -- situations policymakers did not then know they were likely to be worrying about in the future. CIA did this because…… [Read More]

Works Cited:

Answers. (2009). United States Intelligence, History. Answers Corp. Online at 

Bush, G.W. (2002). The National Security Strategy of the United States of America. The White House.

Federation of American Scientists (FAS). (2008). A Framework for Reform of the U.S. Intelligence Community. Federation of American Scientists. Online at 

Johnson, L.K. (2007). Strategic Intelligence. Greenwood Publishing Group.
View Full Essay

Intelligence From 1936-1945 Key Analysis

Words: 334 Length: 1 Pages Document Type: Term Paper Paper #: 19356230

Shortly after, the Navy successfully cracked the Japanese military code in Operation Magic, which allowed U.S. forces to turn the tide of the war in the Pacific by 1942 ("United States Intelligence").

One of the chief actions taken during this period was the creation of the Office of Strategic Services by FDR in 1942. During orld ar II, the OSS coordinated all of the information through collection and analysis that was used for clandestine operations up until 1945 ("United States Intelligence"). The development of the OSS, though short-lived, demonstrates that the role of the intelligence community in United States foreign policy was growing significantly. Before this period, U.S. espionage was limited at best and primarily a domestic affair. By 1945, the role of the intelligence community had greatly expanded and become a more central part of life in the United States.

orks Cited

United States Intelligence, History." Espionage Information: Encyclopedia…… [Read More]

Works Cited

United States Intelligence, History." Espionage Information: Encyclopedia of Espionage, Intelligence, and Security. 2007. 4 Oct. 2007 .
View Full Essay

Intelligence Community Ic Is the Biggest and

Words: 912 Length: 3 Pages Document Type: Essay Paper #: 24865660

Intelligence Community (IC) is the biggest and most multifaceted institution of its kind, consisting of sixteen semi-independent agencies with dissimilar, sometimes corresponding, spheres of accountability. Generally, it has demonstrated problematic to institute integrated direction over the IC. Ensuing major terrorist attacks like that of September 11, 2001, comprehensive intelligence restructurings were sanctioned, including legislature to authorize chief leadership by founding a Director of National Intelligence. Notwithstanding these modifications, opposition to central management still affects the IC to this day. The disaster in structural reform is poorly comprehended, as the literature does not intellectualize intelligence agencies predominantly as organizations.

The methodology recommended herein examines the progressive paths of agencies, which irradiates the organizational factors moving reform. Employing the structure of Historical Institutionalism in the new setting of intelligence agencies aids in explaining the difficulties seen in reform, posed by established interests and governmental cultures, damaging the realistic likelihood of centralized control…… [Read More]


Caswell Jr., Kenneth L. 'Establishment Of The National Maritime Intelligence Center: Understanding The Foundations Of Trust To Support A Collaborative Environment In Homeland Security' (2010).

Healy, Thomas F. 'Fighting Tomorrow's Fire Today: Leveraging Intelligence For Scenario-Based Exercise Design' (2014).

Pope, Robert S. 'Interagency Task Forces: The Right Tools For the Job' (2011).
View Full Essay

Intelligence Practical Exercise

Words: 2535 Length: 7 Pages Document Type: Essay Paper #: 14146722

Intelligence Practical Exercise

Geospatial Intelligence Analysis

GEOINT which means Geospatial Intelligence is a system which is used to analyse an environment for intelligence and operational purposes. (GEOINT Analysis, 2017).

Describe the Environment: Collect key data that defines the precise destination for the planned mission. Geographical, government and cultural limitations must be established. In most cases, the gathered data could consist of vectors, heights, natural landmarks such as rivers, mountains etc., longitude and latitude locations and several others. All these are the basic requirements of the GEOINT invention.

Outline the Effects of The Environment: Elaborate thoroughly on the mission location identified in the previous step. Locate and define its natural state, any existing structures and its cultural atmosphere. Account for all possible factors that might have an effect on a mission in the location such as roads, people, buildings, plants, climate, language, government, cultural divides or social factors. Add this new…… [Read More]



Brown, G., Carlyle, M., Salmeron, J., & Wood, K. (2005). Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses. Tutorials inOperations Research, 102 - 123.

GEOINT Analysis. (2017). Retrieved from National Geospatial Intelligence Agency:

International Nuclear Safety Group. (2010). The Interface Between Safety and Security at Nuclear Power Plants. Vienna: International Atomic Energy Agency.
View Full Essay

Intelligence the Importance of the

Words: 326 Length: 1 Pages Document Type: Term Paper Paper #: 22328487

hile some in the intelligence community may have resented the intrusion of Congress and calls for transparency, the investigations and oversight gave the CIA and the intelligence community a stronger moral footing in the U.S. democracy (DeYoung and Pincus). In a nation in which freedom and open-ness are core values, the continuance of an intelligence community that operates outside of those bounds and values is ethically unacceptable. The long-term health of the intelligence community in the nation was predicated on those Congressional investigations of the 1970s, which successfully infused the U.S. intelligence community with some degree of a "conscience."

orks Cited

DeYoung, Karen and Pincus, alter. "CIA Releases Files on Past Misdeeds." ashington Post 27 June 2007. 15 Oct. 2007

Van agenen, James S. "A Review of Congressional Oversight." Central Intelligence Agency. 14 Apr. 2007. 15 Oct. 2007… [Read More]

Works Cited

DeYoung, Karen and Pincus, Walter. "CIA Releases Files on Past Misdeeds." Washington Post 27 June 2007. 15 Oct. 2007 .

Van Wagenen, James S. "A Review of Congressional Oversight." Central Intelligence Agency. 14 Apr. 2007. 15 Oct. 2007 /library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/97unclass/wagenen.html" target="_blank" REL="NOFOLLOW">
View Full Essay

Intelligence Analysis Process Have Been Discussed This

Words: 1457 Length: 4 Pages Document Type: Essay Paper #: 40715020

intelligence analysis process have been discussed. This paper puts light on what basically is intelligence analysis and how can it be improved. It discusses ways via which intelligence analysis can be made more focused and more effective. It puts light on how better sharing and provision of information, collection and analysis of correct data and fact and figures can benefit the intelligence analysis process.

This paper also puts light on different psychological issues that are being faced by intelligence analysts and it also examines the ways through which analysts can overcome such hurdles.

Intelligence Analysis:

Before discussing how to improve intelligence analysis it is necessary to have proper understanding of the terms intelligence and analysis. Intelligence can be defined as an information which has added value in it whereas analysis is a process via which you can evaluate your intelligence, it helps you to understand a situation and then to…… [Read More]


Federation of American Scientists. (1996). Improving Intelligence Analysis. USA: FAS. Retrieved November 20, 2012 from .

United Nations Office on Drugs and Crimes. (2011). Criminal Intelligence. New York: UNODC. Retrieved November 20, 2012 from .

Heuer, R.J. (1999). Psychology of Intelligence Analysis. USA: Central Intelligence Agency. Retrieved November 21, 2012 from /library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf" target="_blank" REL="NOFOLLOW">
View Full Essay

Intelligence Community DNI

Words: 1376 Length: 4 Pages Document Type: Term Paper Paper #: 83423758

Homeland Security Intelligence

With the advent of new technologies, human lifestyle is improving and people have found better ways to achieve their goals. The impact of technology is found at national level and many security threats are emerged. Keeping in view the possibility of increased security challenges in the time to come, there is serious need to revise the security policies and bring them all together under information communication strategy so that reporting chain and effective control can be determined.

Policy Memorandum of Homeland Security Intelligence

Homeland Security is the matter of national integrity and must be catered for as the utmost priority of government officials and policy makers. The implementing authorities should align their practices with the objective of protecting national integrity and give the feedback to policy makers if there is any issue of concern.

It can be argued that the establishment of a country consists of high…… [Read More]


Center for International and Security Studies at Maryland. 2006. "The Future of Intelligence Analysis." Accessed February 28, 2013. 

Information Sharing Governance Board. 2008. "Information Sharing Strategy." Accessed February 28, 2013.

NWC. 2006. "Homeland Security and Law Enforcement." Accessed February 28, 2013.

United States Intelligence Community. 2008. "Information Sharing Strategy." Accessed February 28, 2013.
View Full Essay

Intelligence Community

Words: 788 Length: 3 Pages Document Type: Essay Paper #: 39202209

Intel Organization

Pfeffer & Salanick (1978) proposed many important ideas in their examination of management theory's incorporation of external elements and controls. While the information contained in this reading are useful in some manner, their perspective remains incomplete and one sided in many ways. While it is true that the external controls and exchanges between organizations have a direct and almost obvious impact on the cumulative results, the author's ignore the requirement for balance and reason within the total concept of control.

While federal intelligence agencies such as the CIA certain would benefit from taking the authors' recommendations when they wrote " the key to organizational survival is the ability to acquire and maintain resources, " (p.2), it still feels that something even more important is left out. The CIA can and does acquire incredibly large amounts of data and information, or resources, however a point of diminishing returns awaits…… [Read More]

View Full Essay

Agencies Working Against Each Other

Words: 361 Length: 1 Pages Document Type: Essay Paper #: 4128641


Both the Central Intelligence Agency (CIA) and the Federal Bureau of Investigation are part of the larger, 17 unit organization that is known as the United States Intelligence Community. The CIA and FBI have had a history of conflict and disagreement as history dictates. The most obvious and direct failure of cooperation of these two organizations was revealed in the aftermath of the attacks of 9/11. The institutional differences between these organizations were fully exposed as the intelligence relating to these events have been partially revealed throughout the last decade plus. This essay will provide some details about this conflict and provide some links to some related information about this idea.

The CIA and FBI are both separate units with different missions regarding the safekeeping of America's resources. In past years the CIA has been much more associated with foreign affairs and…… [Read More]

Here is another condensed version: 

Here is an argument suggesting that the attacks were a product of a false flag operation designed to stir emotion and begin a war in the Middle East:

Here is another that describes Operation Northwood's a model of previous false flag attempts:
View Full Essay

Open Source Intelligence Estimate

Words: 609 Length: 2 Pages Document Type: Essay Paper #: 81762120


The Kingdom of Bahrain, a small Arab state located on the Persian Gulf, is an oil-rich constitutional monarchy. The country has generally been an ally of the United States, but has internal issues that could compromise its security. Less than half of Bahrain's population are native Bahraini, lending the country a more diverse ethnic mix than might be expected. According to the CIA, 70.3% of the population is Muslim. A plurality of these, including the ruling family, are Sunni, but the country also has a significant Shia minority (CIA, 2015).

Internal Ethnic Issues

Non-Bahrainis, despite making up the majority of the population in the country, have few rights and typically do not play a political role in the country. Bahrain's Muslim population is divided among the ruling minority Sunni and majority Shia, and there has been some friction in the past as the result of internal conflict between these…… [Read More]


Akbari, R. & Stern, J. (2012). Bahrain's triangle of conflict. Foreign Policy. Retrieved March 6, 2015 from 

CIA (2015). Bahrain. Central Intelligence Agency. Retrieved March 6, 2015 from /library/publications/the-world-factbook/geos/ba.html" target="_blank" REL="NOFOLLOW">
View Full Essay

Intelligence Led Policing Sounds Like

Words: 316 Length: 1 Pages Document Type: Term Paper Paper #: 54503020

6). The question then becomes, who protects the American public from the CICC?"

Currently law enforcement groups at all levels are protective of the information singularly gathered. If these groups were to share all information at every level the information, whether true or not, can be used in a manner that would take away the constitutional right of American citizens to be considered innocent until proven guilty. In today's world of capable technology assisting law enforcement, analysis of criminal intent and mischief is readily available to all entities.

Sharing the resulting information from such analysis with all other law enforcement will open the door to mismanagement and corruption. Such corruption is already evident in many law enforcement entities and to provide them with additional cannon fodder would be a huge mistake.

orks Cited

Criminal Intelligence Sharing: A national plan for intelligence-led policing at the local, state and federal levels (2002)…… [Read More]

Works Cited

Criminal Intelligence Sharing: A national plan for intelligence-led policing at the local, state and federal levels (2002) , Accessed December 15, 2007
View Full Essay

Intelligence Pearl Harbor Final Judgement

Words: 345 Length: 1 Pages Document Type: Term Paper Paper #: 39476158

Short to military dances. The book is riddled with anecdotes such as these that indicate the military was ill prepared for a surprise attack, and in fact were arrogant in their ignorance.

In fact, Clausen's investigation showed the American military knew Japanese codes but ignored them in seeking intelligence; the agencies were unprepared for war or a surprise attack. As the author notes, "Although vested with high commands and responsibilities, they were surprised by the attack. They were unprepared for war. Thus, they were really guilty of criminal neglect of duty" (Clausen & Lee, 1992, p. 228). There was little joint action between the services during and after the attack, and that had a midnight message been decoded, it might have prevented the attack. In short, Pearl Harbor was a series of bungles that resulted in the most horrific naval losses the U.S. has ever endured.


Clausen, H.C. And…… [Read More]


Clausen, H.C. And Lee, B. (1992). Pearl Harbor: Final Judgement. New York: Crown Publishers, Inc.
View Full Essay

Intelligence the Role of Scientific

Words: 2772 Length: 8 Pages Document Type: Research Paper Paper #: 38343941

More and more deep analysis can clarify the internal dynamics of the matter being studied, and in the long run to prediction, known as estimation. The reason for intelligence analysis is to make known to a precise decision maker the necessary significance of selected target information. Analysts should start with established facts, apply specialist knowledge in order to produce plausible but less certain findings, and even predict when the forecast is appropriately qualified. Analysts should not, however, engage in fortune telling that has no foundation in fact (Heuer, 1999). Not only is it poor science to claim absolute truth, but it also leads to the kind of destructive and distrustful debate we've had in last decade about global warming. The history of science and technology suggests that such absolutism on both sides of a scientific debate doesn't often lead to practical solutions (Botkin, 2011).

In the arrangement of science there…… [Read More]


A Compendium of Analytic Tradecraft Notes. (1997). Retrieved from

Botkin, D.B. (2011). Absolute Certainty Is Not Scientific. Retreived from 

Clauser, J. (2008). An introduction to intelligence research and analysis. Lanham, Maryland:

The Scarecrow Press.
View Full Essay

Counterterrorism and Intelligence Framework Terrorism Has Been

Words: 2343 Length: 8 Pages Document Type: Essay Paper #: 38436637

Counterterrorism and Intelligence Framework

Terrorism has been the greatest threat to American soil since the end of the Cold ar, and the country has responded to these threats by creating an elaborate counterterrorism and intelligence framework. This counterterrorism strategy must use every possible tool in America's arsenal, and must meet the highest standards in excellence for the duty it is tasked to perform. The nature of terrorist threats in America in the 21st century is the fact that nobody knows where and why terrorism may appear.

Three agencies will form the core of the new counterterrorism and intelligence gather efforts coordinated by the Department of Homeland Security. (Homeland Security, 2012) These three agencies are the CIA, the FBI, and the DOD, and each already fulfills necessary functions in America's fight on terror. hile still operating within the legal framework that surrounds each agency, I look to improve the overall effectiveness…… [Read More]

Works Cited

Coker, M. (2012, March 6). U.S., Yemen Restart Training. Retrieved from 

Homeland security. (2012, February 3). Retrieved from (2012). Seventeen Agencies and Organizations United Under One Goal. Retrieved from website: /about-the-intelligence-community/

Lee Myers, S. (2012, March 22). Retrieved from
View Full Essay

Defense Agency Department of Defense

Words: 1943 Length: 7 Pages Document Type: Term Paper Paper #: 40298090

They believe that the information was there for the asking, but that DHS did not have the individuals on the ground that could ask.

Since that time, of course, there has been billions of dollars poured into DHS, DIA and the CIA. The DIA's three centers have become more refined and defined. Those three centers as they exist today, consists of: The National Military Production Center, the National Military Intelligence Collection Center, and the National Military Intelligence Systems Center. Each of the three has specific jobs and responsibilities as well as the objective to effectively coordinate information flow between the three centers.

According to Polmar, The National Military Production Center is responsible for producing and managing military intelligence, including assessments of aerospace, maritime and ground forces of foreign forces as well as threat assessment.

The National Military Intelligence Collection Center does exactly what it sounds like, that is it; manages…… [Read More]

Works Cited

Beal, Clifford (2006) Chronic Underfunding of U.S. HUMINT Plays Role in Intelligence Failures, , Accessed August 21, 2006

Polmar, Norman and Allen, Thomas B. (1997) Spy Book: The Encyclopedia of Espionage. New York: Random House

Powers, Thomas. (2002) Intelligence Wars: American Secret History from Hitler to al-Qaeda. New York: The New York Review of Books
View Full Essay

Foreign and Domestic Intelligence the

Words: 6712 Length: 22 Pages Document Type: Term Paper Paper #: 5885348

S. directly. Evidently, the long-term objectives indirectly face the smooth running of the U.S. government. Priority should be given to those aspects that will pull the resources of the country to extreme levels. The U.S. As a super-power is privileged when tackling issues affecting other nations; it is mandated to help developing long-term solutions.

Long-term also implies that the impacts and effects need to be widespread in order to maintain balance and ensure the prosperity of all sectors is recognized. The above long-term objectives are issues that need time and resources in order to be able to resolve the issue that affects the stability of these countries among other issues. The Soviet Union, for example, is crying to have political relations with ussia. This means that the military forces will be deployed to this country. However, the negotiation process is hefty and requires time and adequate resources in order to…… [Read More]


Bruce, J. & Bennett, M. (2008). "Foreign Denial and Deception: Analytical Imperatives,"

Analyzing Intelligence: Origins, Obstacles, and Innovations. Washington, DC:

Burch, J. (2008). The Domestic Intelligence Gap: Progress Since 9/11? Homeland Security

Affairs, 2.
View Full Essay

US Intelligence Community

Words: 3284 Length: 10 Pages Document Type: Essay Paper #: 67757178

U.S. intelligence community is always expected to perform its duties according to some specified guidelines. This study examines the three themes found in the Pfeffer and Salancik book, "The External Control of Organizations," as applied to the U.S. Intelligence Community (IC). The paper reveals how the themes are applicable to the IC and their potential benefits to the IC. It is evident that the identified have proven to be useful to the community, as it has enabled it to adapt to the changing paradigms within the intelligence community.

The themes

First theme: the importance of the environment or the social context of organizations for understanding what decisions were made about issues ranging from whom to hire, the composition of boards of directors, and what alliances and mergers to seek.

From this theme, the leading obstacle in the realization of accountability in the U.S. intelligence community is the prerequisite of secrecy…… [Read More]


Banner, D.K., & Gagne?, T.E. (2006). Designing effective organizations: Traditional & transformational views. Thousand Oaks, CA.: Sage Publ.

Dobbin, F., & Schoonhoven, C.B. (2010). Organizational studies: The Stanford School 1970-2000. Bingley: Emerald.

Donaldson, L. (2010). American anti-management theories of organization: A critique of paradigm proliferation. Cambridge: Cambridge Univ. Press.

Hatch, M.J. (2011). Organizations: A very short introduction. Oxford: Oxford Univ. Press.
View Full Essay

Recurring Strategic Themes in the History of U S Intelligence

Words: 1450 Length: 5 Pages Document Type: Essay Paper #: 82316876

U.S. Intelligence Stategy Histoy

The United States has always been a county that pided itself on the excellence of its militay excellenc and pecision. The defense and national foces have been at the heat of militay intelligence thoughout the yeas stating with 2001, in Septembe. Many govenment agencies, fo example, have joined foces with moe taditional militay foces to help combat both mino cime foces with those of a moe sophisticated body of cime thoughtout the United States and the wold. A histoical examination of the vaious elements elated to U.S. intelligence duing militay intense times eveal that moe attention to social o human concens duing the times involved might have ceated a geate dive towads caing fo those left destitute by a focus on militay o social concens duing Wold Wa II, the militay inquiies of the 1970s, and the invasion of Iaq stated in 2003. When examining the…… [Read More]

r, intelligence analysts had grossly underestimated Japanese capabilities and intentions, revealing a tendency to misunderstand Japanese actions by looking at them with American cultural biases. After the war, the resolve of America's leaders "never again" to permit another Pearl Harbor largely prompted the establishment of a centralized intelligence structure.

America's entrance into World War II created an immediate need for intelligence to support the warfighter. While the Army and the Navy maintained their own intelligence capabilities, none were prepared to provide the kind of support needed.1 To bolster this effort, the Office of Strategic Services (OSS) was created in June 1942, under the recently established Joint Chiefs of Staff to succeed the Coordinator of Information. William Donovan remained in charge of the reorganized unit. In addition to assuming the analytical role of its predecessor, the OSS was chartered to carry out clandestine operations against the Axis powers on a worldwide scale. It was not, however, readily accepted by the Joint Chiefs of Staff (JCS), who remained skeptical of the value of OSS activities, and the new unit faced strong competition from the FBI and the Army's intelligence organization.

Usually glamorized as the dashing operations arm of the U.S. Army (with its well-known espionage exploits with the Resistance in Europe), the OSS' contribution to intelligence production has gone largely unnoticed. It was, however, one of the seven major intelligence producers and was an important training ground for a generation of intelligence analysts, as well as operatives. Decidedly different than the British system, the OSS established the tradition of putting analysts and operatives in the same organization. The difficulties, however, that the OSS had in establishing itself within the JCS structure reaffirmed
View Full Essay

Is Predicting Terrorism a Beneficial Proposition for Intelligence for Counter-Terrorism Stakeholders

Words: 993 Length: 3 Pages Document Type: A-Level Coursework Paper #: 21669964

Counterintelligence and Predicting Terrorism

Sovereign states have always had a vested interest in accurately predicting the course of future events, from the ancient espionage of medieval courts to the advanced intelligence agencies used today, but the process of anticipating and neutralizing threats on a preemptive basis has proven to be exceedingly difficult in the age of modern terrorism. Western powers explicitly targeted by Al-Qaeda and other jihadist organizations, including the United States, Great Britain, and other industrialized nations, have been forced to exist in a state of perpetual tension, knowing that the next spectacularly-scaled attack is inevitable but lacking the specific foresight needed to prevent its occurrence. With billions of dollars being invested annually to fund counterterrorism intelligence operations, and scant evidence that these efforts have constituted an efficient and effective use of valuable resources, many governments have begun to reassess this philosophy of preventative vigilance. The incredible complexity of…… [Read More]


Kluger, Jeffrey. "Why We Worry About The Things We Shouldn't And Ignore The Things

We Should." TIME Magazine, November 26, 2006, (accessed February 16, 2013).

McNeill, Jenna B., James J. Carafano and Jessica Zuckerman. "30 Terrorist Plots Foiled: How

the System Worked." The Heritage Foundation Backgrounder # 2405, 11-19,  (accessed February 15, 2013).
View Full Essay

Collection of Intelligence

Words: 1476 Length: 4 Pages Document Type: Research Paper Paper #: 14118507

U.S. intelligence refers to some of the most formidable and top intelligence available in the world. The United States has long led the way in the practice of gathering the most up-to -- the minute and esoteric intelligence regarding the actions of other countries, other armies and the other enemies. The current modern age has demonstrated the steady advancement in this regard of a range of sound technological tools which America has harnessed consistently for the effective pursuit of the most current and hard to gather intelligence.


The use of combat drones has been something that America has long used to gather intelligence and to engage in warfare with enemies or suspected enemies. However, in the last 12 months, the usage of drones has steadily decreased. "The number of drone strikes approved by the Obama administration on suspected terrorists has fallen dramatically this year, as the war with al…… [Read More]

References (2013, October). U.S. 'drone strike' kills senior Shabab members. Retrieved from 

BBC. (2013, October). Pakistan says drones killed 67 civilians since 2008. Retrieved from (n.d.). Military Intelligence Satellites. Retrieved from 

Galbraith, P. (2013, October). NSA spying on Europe gives the U.S. more intelligence, but not better. Retrieved from
View Full Essay

U S Intelligence by Seeking an

Words: 2050 Length: 7 Pages Document Type: Thesis Paper #: 74091545

In 1953, Congress amended the National Security Act to provide for the appointment of a Deputy Director of the CIA by the President with Senate's advice and consent. Commissioned officers of the armed forces, active or retired, could not occupy the top two positions at the same time (CIA).

Intelligence Reform Needed

Countless reorganizations of the intelligence community since the end of the Cold War have not produced satisfactory results (Harris 2002). U.S. intelligence counterterrorist programs have certainly made record achievements, such as the thwarting of planned attacks on New York's Lincoln and Holland tunnels in 1993 and against airports on the West Coast in the eve of the millennium. ut reforms are quite needed. The first is to provide warning. The most difficult task of the intelligence officer is to provide warning. The intelligence community also needs a more risk-taking and failure-tolerant management approach. Safeguarding national security means putting…… [Read More]


BBC. Bush Pledge Over U.S. Intelligence. BBC News: British Broadcasting Company,

2009. Retrieved on May 29, 2009 from 

CIA. History of the CIA. Central Intelligence Agency, 2007. Retrieved on May 30, 2009cia.html" - grade/operation-history/history-of-the-cia.html

Harris, James W. The Path to Intelligence Reform: "Changes in the Intelligence Craft
View Full Essay

U S Intelligence Revolution the Transformations

Words: 2090 Length: 7 Pages Document Type: Term Paper Paper #: 96271380

As the Cold War began, U.S. found itself in a war with the U.S.S.R. On several levels and the only method that could have given U.S. The supremacy it desired was through the good use of intelligence. Espionage, military, industrial, and technological developments were all part of the weapons used during the Cold War. This is why the intelligence revolution was very much needed and useful in the end.

In the 1950s and 1960s, the CIA was one of the most respected organizations in the U.S., given its role in resisting against the expansion of influence of the Soviet Union and the spread of communism. These were the main missions of the organization. As the results of having a well-organized and well-trained intelligence agency paid off and as U.S. managed to prove itself superior to the Soviet Union in many instances, CIA became the main instrument for guiding the U.S.…… [Read More]


Kahn, David. The Code-Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. New York: Scribner, 1997

Knight, Judson, CIA (United States Central Intelligence Agency), available at ;

O'Neal, Michael J., United States Intelligence, History, available at ;

O'Neal, Michael J., CIA, Formation and History, available at ;
View Full Essay

Counterterrorism and Intelligence Framework

Words: 2548 Length: 8 Pages Document Type: Research Paper Paper #: 99197542



Counter-Terrorism Framework

The author of this report is asked to answer to a number of questions relating to counter-terrorism frameworks. First, the author is asked to provide a revised framework for the national terrorism prevention and response agencies in the United States. Per the parameters of the assignment, there are to be at least three agencies involved in the revised framework. Subsequent to that, the author is asked to answer to how and when the agencies will interact and why. The author is asked what tools can be used to help the agencies function and do their jobs and that will be included in the framework summary. The author is asked to wrap up the paper by enumerating at least three policy and/or procedural recommendations that should be implemented to make the existing framework gel and function more effectively.

evised Framework

The existing framework for law enforcement and…… [Read More]


Boehm, E. (2013, August 20). New audit finds IRS can't keep track of its own software - The Government Watchdog. Retrieved September 2, 2013, from 

Cillizza, C. (2013, May 21). Everything you need to know about the IRS scandal. The Washington Post: National, World & D.C. Area News and Headlines - The Washington Post. Retrieved September 1, 2013, from 

DOJ. (2004, November 1). Special Report: A Review of the FBI's Handling of Intelligence Information Prior to the September 11 Attacks. Welcome to the United States Department of Justice. Retrieved September 2, 2013, from

Poulson, K. (2013, August 29). New Snowden Leak Reports 'Groundbreaking' NSA Crypto-Cracking | Threat Level | . Retrieved September 2, 2013, from
View Full Essay

KGB Summary of Soviet Intelligence

Words: 1610 Length: 5 Pages Document Type: Term Paper Paper #: 50115287

S.-Soviet partnership lasted only a year and a half. With World War II over and the OSS disbanded in October 1945, the Cold War was looming on the horizon.


The research showed that the KGB was established in 1917 and was official deactivated in 1991. The research also showed that the KGB was not the stuff of the James Bond movies, but rather was characterized by an enormous sense of internal rivalry, a profound sense of paranoia and a desire on the part of many of its agents to defect to the West at their first opportunity. In this environment, it was little wonder that the KGB would resort to some of the tactics it used to achieve its mission, and it is reasonable to assert that current ussian intelligence agents will have taken a lesson or two from their KGB predecessors as they seek to maintain hegemony with…… [Read More]


Andrew, Christopher and Vasili Mitrokhin. 1999. The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books.

Ebon, Martin. 1994. KGB: Death and Rebirth. Westport, CT: Praeger Publishers.

Kalugin, Oleg D. 2002. "Window of Opportunity: Russia's Role in the Coalition against Terror." Harvard International Review 24(3), 56.

Ebon, Martin. 1994. KGB: Death and Rebirth. Westport, CT: Praeger Publishers, p. ix.
View Full Essay

Criminal Justice - Intelligence Does

Words: 2835 Length: 8 Pages Document Type: Term Paper Paper #: 93963443

The major participants in the Cuban Missile Crisis were in many ways driven by intelligence information to make the decisions upon which the crisis centered. The Soviet Union and its puppet nation Cuba relied on the heavy detail they received from their own agencies and believed that as a result of the failure and humiliation of the U.S. during the infamous Bay of Pigs incident that America would be blind at worst to its nuclear build up in Cuba and impotent at best. "At the time of the crisis, the United States possessed many more weapons than the Soviet Union, and thus had a military advantage. Khrushchev had formulated the plan...when he was searching for a place to install nuclear warheads that could not be detected by the U.S. early warning system..." ("Cuban Missile Crisis," 2002, p. 18) Simultaneously, the Americans both feared the Soviets and resented the clear violation…… [Read More]


Cuban Missile Crisis. (2002). Cuban Missile Crisis. Politics & World Affairs: Cold War, 18.

In Defense of Civil Liberties (2004, September 20). The New York Times, p. A24.

Kaplan, Morton A. (2002). Intelligence Failures. World & I, 17, 12.

U.S. Has "No Objections" to China's Nuclear Buildup (2001). The New American, 17, 13.
View Full Essay

U S Intelligence in China the

Words: 4682 Length: 14 Pages Document Type: Research Paper Paper #: 99778763


The withdrawal was supposed to aid the Communists in controlling the areas vacated by the Japanese, who had succeeded in controlling vast portions of Manchuria.

Stalin's efforts were aimed at forcing "the GMD [Guomindang or Chinese Nationalist Party] to make economic concessions, to prevent a united China from allying with the United States, and to placate Washington on the international arena by giving in to American demands for withdrawal," but in actuality he not only laid the groundwork for the Communists' eventual victory, but also opened up a window for the possibility of a U.S.-Communist alliance that would have destabilized the Soviet Union's power; as will be seen, the United States failed to capitalize on this opportunity, but the fact remains that Stalin's withdrawal seems to have backfired.

Stalin's withdrawal was not directly aimed at ensuring a Communist victory, but rather was an attempt to destabilize the country so…… [Read More]


Ashton, S.R. "Keeping a Foot in the Door: Britain's China Policy, 1945 -- 50." Diplomacy and Statecraft 15 (2004): 79-94.

Bjorge, Gary J. "The Third Chinese Revolutionary Civil War, 1945-49: An Analysis of Communist Strategy and Leadership." The Journal of Military History 74, no. 1 (2010):


Boyd, James. "Japanese Cultural Diplomacy in Action: The Zenrin ky? okai in Inner Mongolia,
View Full Essay

Police Law Enforcement Agencies or the Police

Words: 780 Length: 2 Pages Document Type: Essay Paper #: 19893591


Law enforcement agencies, or the police force, operate on several jurisdictional platforms within the United States. In general, their primary mandate is to help maintain societal order and the rule of law by assisting subjects with legal compliance, protecting property, helping to keep citizens and property safe and secure, and for assistance in extraordinary events. The police force is part of the social order of society and mediates public events, pre-empts anti-social behaviors, helps mitigate potential dangers at large events, works with other agencies in general search and rescue, crowd control, regulations, education and awareness campaigns, and to support the rule of law (Cole, 2004). Under the rubric of law enforcement, there are three major categories of police: Federal, Local and State.

Local law enforcement provides routine and micro-policing to the communities within their jurisdiction. This may include traffic enforcement, criminal investigations, local laboratory or forensic investigation, certain types…… [Read More]


The Difference Between Federal and State Law. (2010). Retrieved from The Leadership Conference - 

Cole, G. a. (2004). The American System of Criminal Justice. New York: Wadsworth.

Dempsey and Forst. (2009). An Introduction to Policing. Florence, KY: Delmar Cenage Learning.

Hedgpeth, D. (2008, September 17). Congress Says DHX Oversaw $15 Billion in Failed Contracts. Retrieved from The Washington
View Full Essay

Organized Crime Related intelligence

Words: 3194 Length: 8 Pages Document Type: Essay Paper #: 92951106

Organized Crime elated Intelligence

Those interested in global intelligence would recognize acronyms like CIA, KGB and MSS however for the sake of those who have no knowledge in this area, they mean Central Intelligence Agency -- United States, KGB (Komitet gosudarstvennoy bezopasnosti) -- Soviet Union/ussia, and the Ministry for State Security (MSS) -- China and their activities are covered well by contemporary media. However, here we consider the less famous and covert intelligence agencies that operate currently or used to exist. A number of these agencies had specific job descriptions while the function of the rest were quite vague, however, all these agencies fulfilled their common responsibility of giving their superiors in-depth knowledge of a situation to aid their decisions (Powell, 2014)

The Frumentarii

The Frumentarii, who bear close similarities to the contemporary "secret police" like the SAVAK of Iran and the Kempeitai who existed in Japan during World War…… [Read More]


Greenberg, M. R., & Haass, R. (1996). Making Intelligence smarter. Council on Foreign Relations.

Juul, P. (2013, july 23). Adapting to the Future of Intelligence Gathering. Retrieved from American Progress: 

Nomikos, J. M. (2008). Greek Intelligence Service: A Brief Description. European Journal of Intelligence Studies.

Powell, J. (2014, July 11). A Historical View of Intelligence Gathering: From the Kryptia to the CIA. Retrieved from
View Full Essay

Counter Intelligence Career Report Dia

Words: 1356 Length: 3 Pages Document Type: Term Paper Paper #: 70831691

To handle these responsibilities, intelligence agents need to possess certain skills and education. Most positions require at least a bachelor's degree, and degrees in politics or the sciences are recommended. Applicants need to possess strong writing skills, especially with analytical reports. Strong oral presentation skills are desired. Applicants need to be able to absorb and synthesize large amounts of information, to convey ideas thoroughly and logically, and be able to draw logical conclusions based on careful research and analysis. Computer knowledge and data entry are key skills. In addition, intelligence agents demonstrate leadership and show strong teamwork. Other requirements can include the ability to travel, familiarity with automated tools and systems, and foreign language skills. An applicant to any intelligence department must be able to pass a polygraph test, a background check to gain security clearance, and a psychological interview.

After achieving the right skill set and education, there are…… [Read More]

View Full Essay

Analyzing Open Source Intelligence and Organized Crime

Words: 1133 Length: 3 Pages Document Type: Research Proposal Paper #: 25628206

Open Source Intelligence and Organized Crime

In the words of Bell and Congram (2014), TOC-Transnational Organized Crime can be defined as a crime carried out by an enduring organization or structure created and primarily involved in pursuing profits through several illegal businesses. It shares certain traits with formal organizations: using rules and codes to coordinate activities, division of labour, and allocating tasks with the aim of actualizing some given goals. While it is appropriate to see TOC as being composed of several activities, it can be seen that some specified organized criminal activities fall into the same category. They include activities such as drug trafficking, money laundering, people smuggling, human/sex trafficking, endangered species trafficking, arms trafficking, and most significantly since the last decade, terrorism.

Structure of TOC Groups

According to Bell and Congram (2014), the domestic and transnational groups that perpetrate crimes have succeeded in modifying their structures into flexible,…… [Read More]


Bell, P., & Congram, M. (2014). Communication Interception Technology (CIT) and Its Use in the Fight against Transnational Organised Crime (TOC) in Australia: A Review of the Literature. International Journal of Social Science Research, Vol 2, No. 1, 46-66. Retrieved from

Burke, C. (2007, January 5). Freeing knowledge, telling secrets: Open source intelligence and development . CEWCES Research Papers, pp. 1-23. Retrieved from 

Central Intelligence Agency. (2016, May 12). About CIA. Retrieved May 13, 2016, from Central Intelligence Agency: 

Hayes, B. (2010). Spying in a see through world: the "Open Source" intelligence industry. Statewatch Journal, Vol 20, No. 1, 1-10. Retrived from
View Full Essay

Gathering National Security Intelligence

Words: 623 Length: 2 Pages Document Type: Essay Paper #: 22344843

Collecting National Security Intelligence

Intelligence gathering is one of the most important activities in law enforcement and plays a crucial role in the development of national security strategies. The significance of intelligence in law enforcement and national security strategies is attributed to the fact that it helps in lessening ambiguity intrinsic in observation of external initiatives and activities. National security intelligence is usually collected through a cycle which determines how information is obtained, created, and shared with users. This cycle has five major steps i.e. planning and direction, collection, processing, producing, and dissemination ("Intelligence Collection Activities and Disciplines," n.d.).

Generally, the responsibility of collecting national security intelligence is given to intelligence collection organizations at the national level. These organizations are mandated with the task of gathering, processing, and disseminating security information that is in turn used to develop suitable law enforcement and national security strategies and initiatives. The intelligence collection…… [Read More]


"Intelligence Collection Activities and Disciplines." (n.d.). Operations Security -- Intelligence Threat Handbook. Retrieved August 17, 2015, from 

Steiner, J.E. (2009, October 28). Improving Homeland Security at the State Level. Retrieved from Central Intelligence Agency website: /library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-53-no.-3/improving-homeland-security-at-the-state-level.html" target="_blank" REL="NOFOLLOW">
View Full Essay

Foreign Intelligence Services

Words: 1179 Length: 4 Pages Document Type: Essay Paper #: 69021193

Foreign Intelligence Services

There is much controversy with regard to the foreign policy practiced by the majority of powerful nations in the contemporary society. In an environment where intelligence is often the key to success, emerging powers have the tendency to improve their intelligence services and to get actively involved in competing with some of the established actors in the international setting. hile Russia proved to be an impressive adversary for the U.S. during the Cold ar era, new powers such as China and Iran currently represent significant opponents for the est. hen considering the U.S.' current role in international affairs, it would be important for someone to gain a complex understanding of the degree to which countries such as Russia, China, and Iran represent significant threats today.

Russian-American relations have been turbulent throughout the second half of the twentieth century. The 1990s have brought a breath of fresh air…… [Read More]

Works cited:

Schoen, D. "The Russia-China Axis: The New Cold War and America's Crisis of Leadership." (Encounter Books, 9 Sep 2014)

United States. Congress. House. Permanent Select Committee on Intelligence . "Annual Threat Assessment of the U.S. Intelligence Community: Hearing Before the Permanent Select Committee on Intelligence, House of Representatives, One Hundred Eleventh Congress, Second Session, Hearing Held in Washington, DC, February 3, 2010," (U.S. Government Printing Office, 2010)

"Iran's Ministry of Intelligence and Security: A Profile," A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Combating Terrorism Technical Support Office's Irregular Warfare Support Program December 2012.
View Full Essay

Counterterrorism and Intelligence Framework

Words: 1610 Length: 5 Pages Document Type: Research Paper Paper #: 44117215

Terrorism in recent years has hit an all-time high. Affecting millions of people, radical groups and organizations see terrorism as a favored tactic or approach for bringing to fruition their extreme ideological agendas both domestically and internationally. Terrorism globally chose the United States and other western countries to target in their extremist agendas. The United States government became aware of terrorist efforts after the September 11 attacks. Since then the U.S. has devoted time and resources into developing a counterterrorism and intelligence framework in order to respond to any ongoing and future terrorist attacks/activity.

Counterterrorism refers to the processes that consist of the offensive measures taken to avoid, deter, forestall, and react to terrorism. The United States regarded counterterrorism missions as distinctive operations by clandestine, undercover, or low discernibility means. Counterterrorism presently is categorized as a fundamental task for the United States government. The government has fashioned or redefined distinct…… [Read More]


Jensen, T. (2014). National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision. Journal of Conflict Resolution. doi:10.1177/0022002714545221

Park, A., & Tsang, H. (2015). A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety. Retrieved 12 March 2015, from 

Park, A., Tsang, H., Sun, M., & Glasser, U. (2012). An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligence. Security Informatics, 1(1), 23. doi:10.1186/2190-8532-1-23

Walsh, P. (2015). Building Better Intelligence Frameworks through Effective Governance. International Journal of Intelligence and Counterintelligence, 28(1), 123. Retrieved from
View Full Essay

Varnava 2012 Commented on the Multifaceted Intelligence

Words: 4590 Length: 15 Pages Document Type: Essay Paper #: 2365970

Varnava (2012) commented on the multifaceted intelligence attributes that went into making the construct of British Intelligence gathering in Cyprus, a successful vocation in World War II. This review aims to explore the implications of the role played by local, civil populace in thwarting attempts by military in allowing intelligence inputs through counter-espionage on British and Middle East territories. The review revisits some work on the First World War British efforts on counter espionage measures in Cyprus after 1916. The work will add to the literature on intelligence activities, attempted during the WW1 (Varnava, 2012).

According to Constantinou's (2013) paper, the role played by diplomatic strategies that extrapolates intelligence-gathering process makes it successful. Diplomacy is a means of making skilled, persistent advocacy towards obtaining solutions of complex situations. It fails to make most of its capabilities. The epistemology (of diplomacy) in the context of humanism, above the dimension of intelligence…… [Read More]


Alfonso, K.L. (2010). Femme fatale 2010. AIR AND SPACE POWER JOURNAL MAXWELL AFB AL.

Blair, J. (2011). Hesitation kills: A female Marine officer's combat experience in Iraq. Lanham, Md: Rowman & Littlefield Publishers.

Carreiras, H. (2006). Gender and the military: Women in the armed forces of western democracies. Routledge.

Clandestine Women: Spies in American History (2014) National Women's History Museum. Retrieved from:
View Full Essay

Agency Organization in Which You Worked Include Information

Words: 5237 Length: 20 Pages Document Type: Essay Paper #: 72302251

agency/organization in which you worked. Include information on the size of the organization (number of personnel, of what kinds) and the division of labor into units or departments. Obtain an organizational chart, or prepare one yourself, showing the formal structure of the organization.

The organization where I worked from April 24, 2012 to June 29, 2012 was U.S. Immigration and Customs Enforcement (ICE). Created in 2003, it is the main investigative body of the U.S. Department of Homeland Security Investigation. It is a federal law enforcement agency whose main responsibility includes executing the immigration and custom laws of the United States to protect the country and to ensure the public security.

The detailed chart of the structure of the organization is attached in the Appendix A. ICE has a divisional organizational structure. It is headed by the Director who is appointed by the President of U.S. And approved by the…… [Read More]


Cyber Crimes Center. 2012 June 16 .

Herald, Glenna. U.S. Immigration and Enforcement arrests 44. Chicago Tribune. N.p., 14 June 2012. Web. 19 June 2012. .

Hughes, Gordon, Eugene MacLaughlin and John Muncie. Crime Prevention and Community Safety. Sage Publications, 2002.

ICE Strategic Plan Fiscal Years 2010-2014. Strategic Plan. Washington DC: U.S. Immigration and Customs Enforcement, 2010.
View Full Essay

intelligence learning memory cognition

Words: 1665 Length: 5 Pages Document Type: Essay Paper #: 41677365

Emotions affect how memories are processed, stored, and retrieved, which also impacts how learning takes place. Perhaps more importantly, emotions impact cognitive processes and learning. Neuroscience shows the ways thoughts are processed depends on one's cultural context and also emotional states. Thinking styles may be also linked to the learning process, as Zhang & Sternberg (2010) point out, and thinking styles are themselves related to cultural variables. The ways people process information therefore has to do with social learning as well as emotional learning and memory. Certain types of emotions may be more conducive to specific types of learning styles or learning behaviors. Emotions can also promote synchronized or chaotic neurological responses. These findings have implications for classroom design and pedagogy.

Wealth means far more than just possession of material goods. As Zhang & Sternberg (2010) point out, capital refers not only to assets in the traditional sense but also…… [Read More]

View Full Essay

Intelligence Community

Words: 997 Length: 3 Pages Document Type: Essay Paper #: 32072702

Human interaction provides a roadmap of how we think and process information. The human brain is bipolar with one side, being more feminine, incorporates the emotional and subjective types of data, where the left brain models the scenario and attempts to gather, dissect and disseminate that information for a better purpose. This modeling process can be very helpful in the military intelligence community to help organizations reach better conclusions and hence plan and operate in a more direct and impactful way.

The business world in its attempts to seek and gain a competitive advantage in many different ways and forms provides useful modeling techniques that can be used in any industry or scenario. elating these business models to the intelligence community requires a strong understanding of the words and phrases used within these models. Once a common language has been established, and all key terms are understood, the models can…… [Read More]

References (nd). Business Process Modeling. Viewed 2 Nov 2013. Retrieved from 

Grabo, Cynthia M. (2004) Anticipating surprise: Analysis for strategic warning. Lanham, MD: University Press of America. (ISBN: 9780761829522, download your copy from ( )

Williams, D. (2013). What a Fighter Pilot Knows About Business: The OODA Loop. Forbes, 19 Feb 2013. Retrieved from
View Full Essay

Intelligence in Homeland Security There

Words: 655 Length: 2 Pages Document Type: A-Level Coursework Paper #: 56760027

Integrated agreements will assist in targeting the maximum federal funding at the greatest risk counties, cities and states where through the addition of more funds, security of citizens will be increased (U.S. Congress 2010). U.S. Department of Homeland Security should uphold on what it considers being right. It should be firm on actions vital to the country's ability to respond to such issues. It should issue a mandate on funding for the activities, interoperable communications and should not ignore its own requirements. As a result, local and state governments will succeed in achieving interoperable communications (Studeman, 2002).

The DHS must ensure that localities and states attain a certain degree of appropriate interoperable communications. Activities and actions should be given proper funding. In addition, Department of Homeland Security should allow local and state governments to be flexible and make decisions on how they intend to achieve the standard. The DHS enterprise…… [Read More]


Pincus, W. (2007). An Admonition on Intelligence. New York: ProQuest

US Congress (2010). Congressional Record, V. 153, Pt. 1, January 4, 2007 to January 17, 2007.

New York: Government Printing Office

Studeman, M. (2002). Strengthening the Shield: U.S. Homeland Security Intelligence. Kingston:
View Full Essay

Intelligence Policing and Challenges it Faces

Words: 4020 Length: 11 Pages Document Type: Essay Paper #: 83441126

police adopted intelligence-Led policing? What are the problems associated with its implementations?

Over time, policing methods have advanced, with the most recent strategy in improving response time of police being intelligence-led policing (or ILP). ILP is still in its initial developmental stages, is still not wholly understood, and has not yet been adopted by all agencies (Taylor, Kowalyk and Boba 2007). Studying police managers' views and attitudes can help recognize obstacles. Depending on findings of research, when initiating this strategy, top police officers obtain the information required for foreseeing problems and understanding supervisors' mind-set. Strategy transformations spring from shifts in objectives. For instance, London's Metropolitan police was organized by Sir obert Peel for focusing not on response, but on prevention of crime (Johnson 1988). Improvements were generated through technological advances like automobiles and telephones. These improvements served to lessen response time, as well as expand an officer's patrol coverage (Phillips…… [Read More]


Anderson, R 1994, "Intelligence-led policing: A British perspective," in A Smith(ed) Intelligence-led policing: International perspective on policing in the 21st Century, Lawrenceville, NJ: International Association of Law Enforcement intelligence Analyst.

Anderson, R 1997, "Intelligence-led policing: A British Perspective," In Intelligence-led policing: International Perspective on policing in the 21st Century: Lawrenceville, NJ: International Association of Law Enforcement Intelligence Analyst.

Bennett, T 1994, 'Community policing on the ground: developments in Britain,' in D.P. Rosenbaum(ed) The challenge of community policing: Testing the promises, Thousand Oaks, CA, Sage.

Carter, DL and Carter, JG 2009, "Intelligence-Led Policing: Conceptual and Functional Considerations for Public Policy," Criminal Justice Policy Review 20, no. 3: 310-325
View Full Essay

intelligence handling processes

Words: 1735 Length: 5 Pages Document Type: Research Paper Paper #: 37715243

gathering and using knowledge as a basis for making decisions in formal settings is an old one. If one is to gain advantage over their rivals, it is essential to gather updated knowledge that is also accurate with regard to what they intend to do and their capabilities. The principle applies across a wide range of fields including military strategies, politics, criminal intelligence circles and business. Further, it is a continually evolving process. It has been changing in response to socio-cultural factors, higher advanced analytical skill requirements, organizational demands, and even technology. Review of the roots of intelligence and the analytical procedures as a pre-occupation and profession is a consultative activity. Such analysis of the background of intelligence processes helps us to understand the past, the present and help anticipate the future. We also learn, in the process, that intelligence gathering is an ever evolving field. Consequently, if the practice…… [Read More]


CIA. (n.d.). Signals Intelligence Activities. Retrieved from /library/reports/Policy-and-Procedures-for-CIA-Signals-Intelligence-Activities.pdf" target="_blank" REL="NOFOLLOW">
View Full Essay

911 Commission Report Intelligence and Information Sharing

Words: 1736 Length: 6 Pages Document Type: Essay Paper #: 36311602

Intelligence, Information Sharing, and the 9/11 Commission Report
Intelligence versus information
There two terms are fundamentally different for a number of reasons. The reason the terms are different can be decoded by investigating the ‘why’ from the information gathered. According to Lance (2017) the ‘how’ or ‘what’ is not important in decoding intelligence information. The resource needed to produce valued and true intelligence is by understanding why. The sole purpose any entity receives finished intelligence is to make it possible for the entity to make strategic, operational and tactical decisions with the information received. The media takes information received and takes steps towards transforming this information into stories hence creating actionable intelligence. In essence, according to Lance (2017) intelligence changes the how and what in information into when and why in the process of decision making. Information only becomes finished intelligence through detailed analysis of that information.
Tallmadge (2016) defines…… [Read More]

View Full Essay

Dangerous Mismanagement

Words: 6133 Length: 22 Pages Document Type: Research Paper Paper #: 99577375

Intelligence Failures

In an ever increasingly complex governmental infrastructure, the importance of communication, mission and strategy are of the utmost importance. The Department of Defense (DOD) and all of its law enforcement agencies are in a pervasive struggle to attain both accurate and actionable intelligence in order to perform their duties to the best of their capabilities and intentions.

The purpose of this research paper is to explore the failure of the intelligence process due to extraneous levels of bureaucratic organization. This essay will attempt to explain the many failures of the Department of Defense law enforcement entities as a result of this type of organization.

In order to understand this argument, this essay will first look at the problem itself and try to identify the root cause of these failures. Past failures of intelligence gathering will be examined to help contextualize the argument and give credence to the idea…… [Read More]


Chesney, R. (2011). Military-Intelligence Convergence and the Law of Title 10/Title 50 Debate. J. Nat'l Sec. L. & Pol'y, 5, 539.

Clapper, J. (2011). How 9/11 Transformed the Intelligence Community. The Wall Street Journal 7 Sep 2011. Retrieved from 

Foust, J. (2013). Throwing the Intelligence Community Under the Bus. Beacon Journal 29 Oct 2013. Retrieved from

Gusterson, H. (2011). Atomic Escapism? American Scientist, Jan -- Feb 2011. Retrieved from
View Full Essay

North Korean Intelligence

Words: 1118 Length: 4 Pages Document Type: Essay Paper #: 63291055

North Korean Intelligence:

Throughout its history, North Korea has continued to harass South Korea for as long as these countries have been separated by imaginary line and roadblocks. Since the country invasion upon South Korea in June 1950, North Korea has been a thorn in the daily lives of South Koreans. North Korea has been able to maintain such relations because of intelligence collection capabilities on the Korean Peninsula. The Democratic People's Republic of Korea or North Korea has a comprehensive intelligence gathering structure and several people conducting the intelligence operations. The three main agencies in the intelligence unit are the Ministry for Protection of State Security, Korean Workers Party, and the military intelligence arm.

North Korea's Intelligence Collection Methods:

One of the most evident aspects regarding North Korea is that the country seems to be in a constant mission to gather intelligence on the Korean Peninsula. This is largely…… [Read More]


Erickson, Ryan. "Foreign Intelligence Organizations: Mid Term; North vs. South Korea." Ryan

Erickson, 2009.  / (accessed December 15, 2011).

Jin, Han Young. "NSC's Detection of Cell-Phone Usage Is Strengthening." Daily NK

Brightening the Future of Korea, 2007.  (accessed December 15, 2011).