Name:
Title: How can the US Intelligence Community best provide accurate, relevant and timely indications and warnings of potential threats?
Course:Date: August 17, 2013
How can the US Intelligence Community best provide accurate, relevant and timely indications and warnings of potential threats?
Introduction
The intelligence community is quite important to our country and its role cannot be overemphasized. They are responsible for keeping the country safe from attacks, though not directly like the military or marines. The intelligence community stays alert on behalf of the country, and monitors threats and raises alarm when there is need to do so. Intelligence community of US keeps all other security forces updated and they play an important role in the security of the country.
For the vital role they play in the security of the country, they need to be able to provide accurate and timely information so that we can prepare to handle potential threats. This paper will suggest ways in which security bodies that make up the intelligence community need to act to be able to provide real time alerts. It will also highlight the importance of quick response and assisting the intelligence community in safeguarding national security.
Providing Accurate and Relevant information
This is the main function of the intelligence community. The information provided should be in good time to prevent a threat from turning into a disaster. If information is received by the security forces like the military when it’s too late, then the security of the whole country is compromised.
The first step towards providing accurate information is proper collaboration between the intelligence community and other security forces. The main point of interest here is to safeguard the national security all stakeholders therefore corporation and sharing of information should be a priority. Since both organizations are dealing with security, the military for example may receive threatening information that the intelligence community is unaware of. Corporation between the two bodies will ensure that they are able to get the root of such threats. Other than just sharing of information, also resource sharing is another way of collaborating for the same purpose. Resources used to train the intelligence community personnel should be accessible to major security officers. Sharing of resources will ensure that all personnel involved with security matters are well trained to handle threats and respond to risky situations.
Another way of raising the accuracy levels of the intelligence community working closely with citizens. Rather than being presented as mysterious characters who gather information regarding security threats, they should work closely with the citizens. This may make them be easily identified amongst the public which may seem as a disadvantage. However citizens in the neighborhoods are useful sources of information, they live with criminal minds and terrorists at times. Citizens are best placed in society and working with them intelligence personnel get daily updates about planned threats and attacks. This collaboration puts the intelligence community in a better position not only to provide timely warnings and information but also identify people who plan attacks.
Manage wisely the power vested to them by the constitution. At times members of the intelligence community harass innocent citizens after gathering false information about them. There are many cases of young Muslim men who have been accused and harassed after being suspected to be terrorists. When citizens hear of such cases, they tend to fear the intelligence community and security personnel in general. If citizens fear security agents, it will be hard for them to give information regarding planned attacks or suspicious people living among them. Misuse of power by the intelligence community is a barrier for collaboration and sharing of information between citizens and security agents.
Use of information technology in all operations will also help the intelligence community provide accurate information regarding the security situation. Information technology provides an avenue of resources to track criminals and implement security measures. Monitor all communication between suspected persons, this will provide a basis of accurate information. Also creation of a unique information resource center accessible through the web makes information easily accessible by security agents. Tracking emails and mobile phones belonging to suspected persons will enable them get accurate information about planned attacks. Information technology should be implemented by the intelligence community and this will enable them not only to obtain information from suspected criminals but also share information amongst themselves.
Recommendation to policy makers
The intelligence community should bring its services closer to the people. While retaining their anonymity which is important for them, they should also focus more on better relationships with the people. Citizens are the best source of information in matters of security threats because those who plan these attacks live amongst the citizens. Aim at building a close relationship between the intelligence community and the citizens. All security agencies should collaborate and share information with each other to provide national security. Information technology should be implemented in order to obtain information that is accurate.
References
Aura, Tuomas. Information security technology for applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers. Heidelberg: Springer, 2012.
Berlatsky, Noah. The U.S. intelligence community. Detroit: Greenhaven Press, 2011.
Friedman, Lauri S.. National security. Detroit: Greenhaven Press, 2010.
Haugen, David M.. National security. Detroit: Greenhaven Press, 2007.
Intelligence analysis for tomorrow: advances from the behavioral and social sciences. Washington, D.C.: National Academies Press, 20112011.
Richelson, Jeffrey. The US intelligence community. 5th ed. Boulder, Colo.: Westview Press, 2008.
Mapping the global future: report of the National Intelligence Council’s 2020 Project, based on consultations with nongovernmental experts around the world.. Washington, D.C.: National Intelligence Council : [Supt. of Docs., U.S. G.P.O., distributor, 2004.
Grance, Tim. Guide to information technology security services. Gaithersburg, MD: National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, 2003.
Treverton, Gregory F., and C. Bryan Gabbard. Assessing the tradecraft of intelligence analysis. Santa Monica, CA: RAND Corp., 2008.
Withrow, Denice D., and David L. Jamison. Perceptions regarding government mandated radio frequency identification human implant technology. Jackal: Pumu, 2011.