Intelligence & Counterintelligence & Terrorism
Essay by DamarJ • June 23, 2016 • Study Guide • 755 Words (4 Pages) • 1,275 Views
Ch. 8 Intelligence & Counterintelligence & Terrorism
Politicians and policy makers cherry pick intelligence to meet their needs. This is damaging
NSC = National Security Council. They produced the NIE
Big Daddy DNI is the head of the Intelligence Community. ONE person
Fusion centers are helping the DHS’s intelligence mission. This is local (police agencies)
SIGINT is primarily performed by the NSA (National Security Agency)
CIA = HUMINT (Human intelligence) emphasis on foreign HUMINT too
DIA (Defense Intelligence Agency)
- Housed at the Pentagon
- Primary responsibility is military int.
- DIA is the military equivalent to the CIA, except they’re concerned with ALL sources of int.
FBI – American soil, root out and thwart terrorist plots that occur on American soil
FBI is the primary agency responsible for Counter int. on American Soil
- Keep WMD’s and other technologies from getting in wrong hands
- Protect US int. secrets
- Protect US government and contractors secrets
- Protect US assets
- Focus on countries that pose the greatest threat to US
Ch. 9 HS & WMD’s
In terms of HS, the greatest threat to public safety is the potential use of WMD’s. WMD’s can be biological, Chemical, or nuclear
The federal Gov. definition of a WMD is outdated as fuck
First used by Germans in WW2. Little effect, but caught the eye of other countries
3 types of WMD’s, Nuclear/Radiological, Biological, & Chemical. Of those 3 types, nuclear devices raise the most concern. Only 9 countries are reported to possess them
Toxins are not living organisms like bacteria/viruses, but are derived from plants and animals. They are considered biological weapons
The biggest concern regarding biological WMD’s is new strains of viruses that might be created through DNA modification
Nerve agents are the most dangerous chemical agents. They inactivate certain enzymes affecting the brain
Nuclear bombs are the greatest danger
Ch. 10 Cyber Crime & Terrorism
PEM = Physical, Electronic, Malicious.
Malicious code –
- Most common type of attack
- Can disrupt a computer’s or network’s operation
- It can spread from one computer to another resulting in large scale problems/losses like meek mill
There have not been any documented instances of significant cyber terrorism
The internet is mainly built up from the PRIVATE sector
FBI has
...
...