Tutor Quora

HSM 433 Counter Terrorism And Intelligence Analysis

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

HSM 433 Counter Terrorism And Intelligence Analysis

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

HSM 433 Counter Terrorism And Intelligence Analysis

0 Download6 Pages / 1,435 Words

Course Code: HSM433
University: The University Of Arizona

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United States

Question

Role of U.S. Agencies in Counterterrorism

Write an essay in which you select one U.S. agency from the list below and explain the agency’s role in counterterrorism operations. The U.S. agencies to choose from include:

National Security Agency (NSA)
Department of the Treasury,
Department of Homeland Security
Department of Energy,
Department of State, or
Defense Intelligence Agency (DIA)

In the essay,

Summarize the function of the agency as it relates to counterterrorism operations inside the United States and identify the tools available to the agency to conduct counterterrorism operations.
Evaluate how your selected agency interacts with at least one other agency to perform counterterrorism operations.
Identify the types of intelligence collected by the agency, and analyze if there are any restrictions on use of the intelligence gathering techniques in counterterrorism operations.

Answer 
Introduction to the Agency
The National Security Agency is a national level intelligence agency functioning under the United States Department of Defense. The department functions on the authority of the Director of National Intelligence. The National Security Agency is mainly responsible for global monitoring, collection and processing of different types of data that are either acquired by normal means or by top secret means. Apart from this the organization is also responsible for collection of intelligence for foreign intelligence and counterintelligence purposes. It is capable of a special signaling system known as Signaling intelligence through which it aims to make the most of the communication (fincen.gov 2018). Headquartered in Maryland, U.S.A, the following agency has an estimated budget of more than $10 billion. The NSA does not involve itself in foreign human espionage and generally carry out different types of work through the transformation of intelligence through intelligence signaling systems. It was formed in the year 1952 just after the end of the Second World War and had actively participated in gathering information during the Cold War era, Vietnam War and the Afghanistan, Iraq and Syria conflicts. The mission of the department is to include different radio eavesdropping, intercepting phone calls and radio calls to ensure the safety of the organization in any different cases of security threat to the nation (dni.gov 2018).
Summary of the Function of the Agency
The NSA was created as a part of the belief that the importance of a distinct character of communications intelligence warranted an organization that was to be totally different from that of the armed forces and the other kind of intelligence agencies of U.S.A (Clapper 2015). Though the department operates in coordination with the department of defense, the NSA mainly belongs to the intelligence committee. The main function of the department is to include the protection and the formulation of different codes, ciphers and other cryptology for the U.S military and the other kinds of Government agencies as well as the interception, analysis and solution of different coded transmissions by electronic or other special means. The agency has separate wings for research and development that conducts research of varying formats. It also conducts posts to intercept different type of signals all around the world. The main activities of the following organization can thus be pointed out in a list. They are as follows;

Staffing and supporting the President of America in different National security and foreign policy
Advocating and advancement of different types of presidential initiatives within the executive branch of the government
Injecting a sense of strategy into the interagency process
Explaining the policies of the President to the public

The organization basically uses the Scowcroft model whose elements are as follows;

Providing a policy of advice to the President in confidence
Keeping a very low public profile
Conduction of a fair and transparent process to suggest policies to the President of the state
Putting the President at the center of the decision making process

Identification of the tools available for the agency to conduct counterterrorism operations
There are a number of different tools that have been in use by the NSA to counter the different terrorism activities that are presently happening in USA and different parts of the world that threatens the security of USA. Some of them are as follows;

Foreign Intelligence Surveillance Act-The 1978 Foreign Service Intelligence Act was enacted as a response to public outrage over the extent of domestic spying during the presidential term of Kennedy and Nixon. The following act was unique as because it created a distinctive nature between the criminal and that of the intelligence investigations in terms of the different standards of the Government. The criminal investigation needs a probable cause to obtain a surveillance warrant (fincen.gov 2018). On the other hand the FISA act provided power to the intelligence agency to carry surveillance activities without the presence of any warrant or any written permission as such.
Patriot Act-The following act was incorporated by the Bush administration on the year 2001 to provide the necessary tools required to intercept and obstruct the terrorism activities.  Under the Patriot Act and the attorney general’s new guidelines, FISA data obtained from wiretaps, trap and trace devices, pen registers, e-mail, secret grand jury information and other information in criminal cases can now be turned over to intelligence agencies if the material is deemed “foreign intelligence information.”

Apart from the above mentioned tools there are also other kinds of acts and special permissions that help the National Security Agency to conduct different types of operations in an organized and secret manner to protect the country and provide accurate intelligence (Falk and Morgenstern 2009).
Evaluation of coordinating activities with other similar organizations
The National Security Agency is directly under the Department of Defense and therefore its coordination with other intelligence organizations is surely quite common in nature. The agency conducts regular meetings with the other secret intelligence agencies like FBI, CIA, Department of Homeland Security, Department of State and many others as such to keep updated. The coordination with each other also helps to keep danger from terrorism away. The organization was widely criticized after it failed to intercept the attacks of World Trade Center and thus it now communicates different details on intelligence and tries to innovate with new ideas of communication and decoding (dni.gov 2018). The main activities of the organization thus also depend on the existence of a proper intercommunication among the different intelligence agencies.  
Types of Intelligence collected by the Agency
The different kinds of intelligence collected by the organization are as follows;

Human Intelligence- the Human intelligence is referred to the collection of information from different human sources. The collection may be done openly or by secret means. The agency has a large number of persons functioning in the country as well as outside the country to make sure that they are updated about all the different types of the intelligence.
Signals Intelligence- It refers to signal intelligence which are collected from signals received through planes, ships, UAV’s, satellites and many other different types of other sources of collecting signals accordingly. SIGINT is a particular type of signal communication used by NSA.
Imagery intelligence- Imagery intelligence is sometimes referred as collection of intelligence through photo. The photos are generally collected from airplanes and UAV’s that are undetectable and untraceable by radars.
Measurement and Signal Intelligence- MASINT is the short form of the measurement of signature intelligence. It is not known to most of the persons and is a coded collection form of intelligence. MASINT generally includes the different types of advanced processing and the use of the information that is gathered from the different types of the overhead and airborne systems of the organization. This includes the likes of the IMINT and SIGINT collection systems (dni.gov 2018). Apart from this the organization also uses the Telemetry intelligence systems which are better known as TELINT. It is used to point out the data that is relayed by different kind of weaponries during the tests. ELINT or electronic intelligence on the other hand can indicate electronic emissions that are picked up from different modern weapons and tracking devices. Both of the mentioned systems can be types of signature intelligence systems and helps to contribute to measurement of signature intelligence.

References
Clapper, J. (2015, 24 July). “Herding Cats” Aspen Security Forum – Interview by Andrea Mitchell (Links to an external site.)Links to an external site. [Video]. Retrieved from: https://www.youtube.com/watch?v=-1dWq0sxRlY 
Falk, O., and Morgenstern, H. (Eds.). 2009. Suicide terror: understanding and confronting the threat. Hoboken, NJ: John Wiley and Sons, Inc.Chapter 7: Medical Management of Suicide Terrorism
Financial Crimes Enforcement Network United States Department of the Treasury. (n.d). USA Patriot Act (Links to an external site.)Links to an external site.. Retrieved from https://www.fincen.gov/statutes_regs/patriot/index.html https://www.heritage.org/research/commentary/2013/7/60-terrorist-plots-since-911-continued-lessons-in-domestic-counterterrorism?ac=1 
Office of the Director of National Intelligence (Links to an external site.)Links to an external site.. (https://www.dni.gov/index.php/intelligence-community/members-of-the-ic)
The Federal Bureau of Investigation. Intelligence Collection Disciplines (Links to an external site.)Links to an external site.(INTs) Retrieved from: https://www2.fbi.gov/intelligence/di_ints.htm
Zuckerman, J., Bucci, S., and Carafano, J. 2013. 60 Terrorist Plots Since 9/11: Continued Lessons in Domestic Counterterrorism (Links to an external site.)Links to an external site.. Report SR-137. The Heritage Foundation, Washington DC. Retrieved from:

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 6 pages

PAY 4 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). HSM 433 Counter Terrorism And Intelligence Analysis. Retrieved from https://myassignmenthelp.com/free-samples/hsm433-counter-terrorism-and-intelligence-analysis/function-of-the-agency.html.

“HSM 433 Counter Terrorism And Intelligence Analysis.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/hsm433-counter-terrorism-and-intelligence-analysis/function-of-the-agency.html.

My Assignment Help (2021) HSM 433 Counter Terrorism And Intelligence Analysis [Online]. Available from: https://myassignmenthelp.com/free-samples/hsm433-counter-terrorism-and-intelligence-analysis/function-of-the-agency.html[Accessed 18 December 2021].

My Assignment Help. ‘HSM 433 Counter Terrorism And Intelligence Analysis’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. HSM 433 Counter Terrorism And Intelligence Analysis [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/hsm433-counter-terrorism-and-intelligence-analysis/function-of-the-agency.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

MyAssignmenthelp.com is the perfect solution to render quality solution for all sort of academic issues. We have hired professionals from different fields of study to provide assistance with different subjects. We successfully have provided different types of assignment solutions on 100+ subjects. We have hired industry experts to deliver nursing assignment, hr assignment and finance assignment help. To offer quality content with IT assignments, we have hired IT professionals to render programming language assignment help and IT assignment help for other types of IT assignments as well.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »