Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

What are the capabilities and limitations of U.S. human and technical intelligence collection programs?

Provide evidence from the weekly readings to support your arguments via APA parenthetical citations.

Other sources (if used at all) must be subordinate to your understanding of the readings presented in the class.

I look forward to reading your posts and providing feedback on your topics!

Instructions: Your initial post should be at least 350 words.

By now you should have a strong understanding of the history of intelligence in the U.S.; how the intelligence community functions; how intelligence is produced; and the role of local, state and the federal governments in intelligence activities. But, you may still be wondering where does all the information that these entities collect actually come from. And, just as importantly, how is this information obtained.

In lesson three, we learned about the intelligence process and used the Central Intelligence Agency's (CIA's) five-phase cycle to examine the various steps. As you recall, in the process, phase two is the collection phase. We briefly also identified and defined the six basic sources of information. These are referred to as "intelligence collection disciples" or the "INTs"

1. Human Intelligence (HUMINT)
2. Signals Intelligence (SIGINT) derived from all communications intelligence (COMINT), electronic intelligence (ELINT), or foreign instrumentation signals intelligence (FISINT).
3. Imagery Intelligence (IMINT)
4. Measurement and Signatures Intelligence (MASINT)
5. Open-Source Intelligence (OSINT)
6. Geospatial intelligence (GEOINT)

These six disciplines are the sources of all the information that is collected to produce intelligence products. Remember, it is a bit of a misperception that secret "movie-like" missions collect all information. While it is true that some is indeed collected in the more classic "spy" type way; a great deal of information is collected by looking at sources that everyone can access.

For the purposes of this class, we will use the Federal Bureau of Investigation's (FBI's) explanations of the first five INTs, which include a high level discussion of which members of the IC use the those INTs. The description of the last INT, GEOINT, remains the same as lesson three and is provided by the CIA.

Human Intelligence (HUMINT) is the collection of information from human sources. The collection may be done openly. For example: when FBI agents interview witnesses or suspects, or it may be done through clandestine or covert means (espionage). Within the United States, HUMINT collection is the FBI's responsibility. Beyond U.S. borders, HUMINT is generally collected by the CIA, but also by other U.S. components abroad.

Signals Intelligence (SIGINT) refers to electronic transmissions that can be collected by ships, planes, ground sites, or satellites. Communications Intelligence (COMINT) is a type of SIGINT and refers to the interception of communications between two parties and includes electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT). U.S. SIGINT satellites are designed and built by the National Reconnaissance Office, although conducting U.S. signals intelligence activities is primarily the responsibility of the National Security Agency (NSA).

Imagery Intelligence (IMINT) is sometimes also referred to as photo intelligence (PHOTINT). One of the earliest forms of IMINT took place during the Civil War, when soldiers were sent up in balloons to gather intelligence about their surroundings. IMINT was practiced to a greater extent in World Wars I and II when both sides took photographs from airplanes. Today, the National Reconnaissance Office designs, builds, and operates imagery satellites, while the National Geospatial-Intelligence Agency is largely responsible for processing and using the imagery.
Measurement and Signatures Intelligence (MASINT) is a relatively little-known collection discipline that concerns weapons capabilities and industrial activities. MASINT includes the advanced processing and use of data gathered from overhead and airborne IMINT and SIGINT collection systems. Telemetry Intelligence (TELINT) is sometimes used to indicate data relayed by weapons during tests, while electronic intelligence (ELINT) can indicate electronic emissions picked up from modern weapons and tracking systems. Both TELINT and ELINT can be types of SIGINT and contribute to MASINT. The Defense Intelligence Agency's Central MASINT Office (CMO), is the principal user of MASINT data. Measurement and Signatures Intelligence has become increasingly important due to growing concern about the existence and spread of weapons of mass destruction. MASINT can be used, for example, to help identify chemical weapons or pinpoint the specific features of unknown weapons systems. The FBI's extensive forensic work is a type of MASINT. The FBI Laboratory's Chem-Bio Sciences Unit, for example, provides analysis to detect traces of chemical, biological, or nuclear materials to support the prevention, investigation, and prosecution of terrorist activities.

Open-Source Intelligence (OSINT) refers to a broad array of information and sources that are generally available, including information obtained from the media (newspapers, radio, television, etc.), professional and academic records (papers, conferences, professional associations, etc.), and public data (government reports, demographics, hearings, speeches, etc.). Unlike the other INTs, open-source intelligence is not the responsibility of any one agency, but instead is collected by the entire USIC. One advantage of OSINT is its accessibility, although the sheer amount of available information can make it difficult to know what is of value. Determining the data's source and its reliability can also be complicated. OSINT data therefore still requires review and analysis to be of use to policymakers.

Geospatial intelligence (GEOINT) is the analysis and visual representation of security related activities on the earth. It is produced through and integration of imagery, imagery intelligence, and geospatial information. The GEOINT user community is a component of the National Systems for Geospatial Intelligence (NSG).

It is important to keep in mind a few key points about collection. Often in the field of intelligence you will hear a great deal of discussion about "connecting the dots" meaning putting all the pieces of information together to yield a usable end product or action. However, this is not what collections is about. Collections literally means collecting the information OR collecting "the dots". The next phases of the intelligence cycle process and analyze the collected information, which is connecting the dots (Norwitz 2010).

References

Central Intelligence Agency (CIA). Retrieved from https://www.cia.gov/library/publications/additional-publications/the-work-of-a-nation/work-of-the-cia.html

Federal Bureau of Investigation (FBI). http://www.fbi.gov/about-us/intelligence/disciplines

Norwitz, J. (2010). Disrupting human networks: Ancient tools for modern challenges. In Homeland Security and Intelligence, edited by Logan, K. Santa Barbara, CA: Praeger Security International. Retrieved from http://ezproxy.apus.edu/login?url=http://psi.praeger.com/doc.aspx?d=/books/gpg/C9095C/C9095C-1079.xml

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M91988974
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Homework Help/Study Tips

Question requirements and guidelines1 download the required

Question: Requirements and Guidelines 1. Download the required Milestone 3 Template ( word document ). Nursing Care Issue : Medication errors 2. Milestone 3 is a continuation of and builds upon Milestones 1 and 2. Review ...

Quesiton create a 10- to 12-slide powerpointreg

Quesiton: Create a 10- to 12-slide PowerPoint® presentation that discusses Freud, Erikson, and two other psychoanalytic or neo-psychoanalytic theorists. Discuss the following in your presentation: • Why was Freud's work ...

Question 1 1how does safety help contain costs as well as

Question 1: 1. How does safety help contain costs as well as reduce illness and injury? 2. Which environmental hazards can pose risks to a person's safety. 3. Which preventive actions are in place for motor vehicle accid ...

Assignment safety security and the futureas noted

Assignment : Safety, Security, and the Future As noted previously, the general residential property criminal offense rate, which includes burglary, increased by 10% in 2010 and 2011 (U.S. Department of Justice, 2012). It ...

Your success with the city of palms landed you a new

Your success with the City of Palms landed you a new consultant job. The organization that suffered the hazard you chose in Week Two hired you to further explore its disaster. This week, the organization asked you to rev ...

Question please include the following for your preliminary

Question: Please include the following for your preliminary work on your Research Argument Paper 1. Your issue of controversy(This is not the same as a topic which is usually broader-see below for an example.) 2. Debate ...

Hot topic discussion forum instructionsplease read this

Hot topic discussion forum Instructions Please read this article. There are also videos embedded in the article. Article Let's get a conversation going. This idea has been around for a really long time. We hear all kinds ...

Overview of network security assignment - security

Overview of Network Security Assignment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Assignment review a journal article related to adult

Assignment : Review a Journal Article Related to Adult Education, Training, or Lifelong Learning Each student is expected to complete an article review associated with the field of adult education, training, or lifelong ...

Question create a hypothetical business scenarionbsp in

Question: Create a hypothetical business scenario   in which there is a clear ethics violation. Suggest a plan of action to resolve this situation. Complete your scenario in a total of no more than 225 words. The respons ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As