Exist Within Several Large National Intelligence
Db1
For federal, state, local, and tribal law enforcement officials, striking the delicate balance between homeland security and the civil liberties of Americans is often seen as the most difficult challenge in combating terrorism and protecting U.S. national security. For this assignment, you are to write 600–800 words discussing this delicate balance. Your posting should specifically address the following questions:
Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:
- How should federal, state, local, and tribal law enforcement meet the need to gather terrorism-related intelligence with the requirement to protect the civil rights of their citizens? Explain.
- What types of data should federal, state, local, and tribal agencies be allowed to store in their intelligence fusion centers? For how long? With what safeguards? Explain.
- What policies should be in place to prevent racial, religious, and ethnic profiling? Explain why.
- How might federal, state, local, and tribal agencies use prevention policies to increase cooperation in local communities? Explain.
Individual Assignment 1
Most people attribute the creation of law enforcement and intelligence fusion centers with the events of September 11, 2001. However, from 1999–2002, a series of major events primed policy makers within the U.S. intelligence and law enforcement communities to formalize cross-community information sharing activities and ultimately to create an effective law enforcement and intelligence information-sharing environment.
As the new millennium was set to begin, Ahmed Ressam (the Millennium Bomber) was stopped as he exited a ferry crossing from Canada to a remote U.S. entry point. The contents found in his trunk would have allowed Ressam to achieve his goal of setting off an explosive device at the Los Angeles airport. This event, which occurred just two years before 9/11, led to meetings regarding the creation of some type of fusion and/or sharing process. Further discussions would advance this idea in the fall of 2002. In October of 2002, unprovoked shootings in the Washington DC metropolitan area resulted in 10 people dead and three critically injured. At the outset of these shootings, a massive police investigation across local and federal levels developed to apprehend the so-named Beltway Sniper. Local and federal law enforcement officials in the East attempted to fit the pieces together and analyze messages left by the killer or killers. This sniper case, combined with previous lessons learned, culminated in the realization for the need to formalize a multijurisdictional information-sharing activity. Members from across the law enforcement community—combining with elements of the homeland security, defense, and intelligence communities—set about institutionalizing this effort as quickly as possible.
Assignment Guidelines
- For this assignment, you are a member of the law enforcement community tasked with institutionalizing this effort.
- Address the following in 2-3 pages:
- What are the challenges for federal, state, and local law enforcement in collecting intelligence information as it pertained to these two events? Explain.
- What lessons were learned from these events with regards to intelligence collection and information-sharing? Explain.
- What recommendations can you offer on how to create an information-sharing environment? Explain.
- How would your recommendation effectively formalize multijurisdictional information sharing to counter some of existing challenges? Explain.
- Be sure to reference all sources using APA style.
Individual Assignment 2
You are an intelligence analyst for the Federal Bureau of Investigation (FBI) assigned to the Counterintelligence (CI) Division. You have been embedded on the Kartesia Country Team and are responsible for producing a counterintelligence assessment to forecast the potential counterintelligence threat posed by Kartesia.For many years, Kartesia and the United States have been political and economic adversaries. Kartesia, which is led by an oppressive dictatorship, has long feared that the United States will initiate military action against it to topple the regime and institute a democratic form of government. Although Kartesia’s ability to engage the United States in traditional warfare is limited, it has a very well developed and sophisticated intelligence apparatus that it deploys in the United States, as well as against the U.S. presence within Kartesia in other third world countries. The Kartesia Intelligence Services (KIS) also heavily target antiregime elements in the United States, most of which exist within several large Kartesian émigré communities located throughout the country. Kartesia also has a long history of supporting other groups and countries that are hostile to the United States, including providing financial and logistical support to terrorist groups.The U.S. intelligence community (USIC) has designated Kartesia a high-priority target, as is reflected in the National Intelligence Priorities Framework (NIPF). FBI resources dedicated to countering the intelligence activities of Kartesia in the United States are also in a position to fill these broader USIC requirements. One topic of particular concern to the USIC is whether Kartesia has a program to develop weapons of mass destruction (WMD), and if so, what its plans, capabilities, and intentions are.For this assignment, you must write a paper of 750–1,000 words discussing how U.S. counterintelligence will be used to counter the potential threat from Kartesia. Assignment Guidelines
- In a paper of 750–1,000 words, address the following:
- What is the purpose of the National Intelligence Priorities Framework (NIPF)? Explain.
- How do counterintelligence professionals utilize the NIPF? Explain.
- How does the FBI Counterintelligence Division utilize the steps of the intelligence cycle to validate threats and initiate counterintelligence assessments? Explain.
- Be sure to address each of the 6 phases of the intelligence cycle.
- How will counterintelligence be used to counter the potential threat from Kartesia? Explain.
- Compile your responses in your final paper, and submit the file to your instructor.
- Be sure to reference all sources using APA style.
- In a paper of 750–1,000 words, address the following: