Counter Intelligence Activities

Introduction

Counter Intelligence arm of the US government works with the objective of addressing national security issues by collecting, analyzing and investigating related information that adversely affects the smooth running of the states operations, functional services or foreign organizations. Basically, CI relates to specific activities being initiated typically by the Federal Bureau of Investigations and other related disciplines to shield the state against assassinations, espionage, sabotage or other related terrorist atrocities. Basing on a number of previous terrorist and cyber attack incidents, that have made headlines on national television, it’s logically reasoned that such dealings in relation to the subject matter is an issue subject to debate[1].

Don't use plagiarized sources. Get Your Custom Essay on
Counter Intelligence Activities
Just from $13/Page
Order Essay

This research examines counter intelligence mechanisms and operations as they offer stretched support to counter terrorism, espionage, sabotage and atrocious cyberspace operations, geared towards addressing national security issues including both military and civilian concerns.

The Influence of Counter Intelligence on National Security

Since the beginning of terrorism and cyber attacks, the issues that speak about the security of the nation, always have been given undivided attention. This is because such issues are in ways more than one attributed to the effective and efficient running of the states operations[2]. To say the least, counter intelligence apparently has a hand in the protection and safeguarding of the states assets and more so the military operations, in order to dictate productive potency of United States’ well-being. Therefore for such reasons, counter intelligence ideas and facts are devoted specifically to initiate an up and running platform of the states national security affairs, putting in to consideration the scores that posses a threat to civilian’s safety due to individuals and antagonistic organizations, engaging in sabotage, espionage or even terrorism.

In accordance with the research conducted by Byman[3], there’s a strong correlation linking cyber attracts, sabotage, espionage and terrorisms among others, to national insecurity. Counter intelligence activities comes in handy in this situation since they helps provide knowledge with reference to operations, tactics and organization’s potential, to cause activities such as terrorism. On this note, the Federal Bureau of Investigations is working tirelessly with counter intelligence in mind to ensure that such subversive dealings are driven down. Here is how CI knowledge influences national security:

Offers Support to Intelligence Bodies; the military system is strategized to oversee close to 100% security guarantees. In order to achieve this, the United States Army embraces counter intelligence techniques by providing prior safety warnings with the objective of eradicating possible threats to national security[4].

Normalize Domestic and Civil Issues; counter intelligence information offers a ground that incorporates legal affairs, more precisely of civil nature. In this case CI offers a support system that addresses both civil and domestic turbulence with the aim of generating a foundation that fosters stability on such issues. Domestic and civil issues have ties on national security as a whole and addressing such issues will be a plus on security levels in the country[5].

Identification of Terrorism, Espionage, Sabotage and other Cyber Related Activities;                         Counter intelligence entails procedural following of happenings right from identifying of a given unlawful practices to proving that they are actually bound to happen. The procedure starts by detection following a given amount of evidence, and then investigation and a thorough research is carried out to come up with findings that will help in the analysis and evaluation, to determine the tenacity of the problem at hand[6]. Basing on the idea that such activities appear to have some common basis, reference is given to the previous happenings, so as to determine the likelihood of occurrence of a similar activity and the expected outcome.

Counter Intelligence Support to Counter Terrorism and Cyberspace Operations

According to various United States reports, an elaborate peek on the previous chain of events that owe their foundation to cyber attacks and terrorism, depict that US suffered heavy economic malfunctions as a result[7]. A case is drawn dating back between 2012 and 2013 from a number of United States banks, which were under the blockade of cyber attacks. These attacks have raised debates and investigations concerning the source of what basically drove down the financial progress of such financial institutions to an economic turmoil. Still unclear, some study correlates the conception of these happenings to the fallout that existed between US and the Russian government. The argument is based on the fact that, still with the technology that places US security techniques at the roof top in comparison with other states, the country still suffered the attacks. It’s further stated that more improved strategies should be incorporated in the sector of financial services to cub the issues-the military kind security system[8].

In his research, one Donohue[9] points to an instance that illustrated the then, terrorist attacks as the peak of terrorism. At no point will the 1993 World Trade Center Bombing be disputed for an activity that defines business as usual. Though, there have been more profound  terrorist attacks on US soils with voluminous impacts, the 1993 World Trade Center Bombing left six people dead and a good number succumbed to injuries and  property losses  that can be equated to thousands of US dollars[10].

The Role of Counter Intelligence Support Regarding it’s Activities, Functions, and Operations

According to Donohue[11], a number of factors have triggered the alarming rate of international terrorists’ attacks and cyberspace operations. Among them is the issue about the ever revolutionizing technology and the unwavering need to expand the boundaries of wealth acquisition quickly, among individuals. This explains why pronounced figures of persons resort to such practices in order to rapidly fit in the corporate world expectations. Regardless, counter intelligence support system seeks to disrupt and put an end to such practices by following concrete steps and using the terrorists’ weak points to strongly strategize proper elimination method.

From information above, CI activities, functions and operations are geared towards protecting the state as a whole against sabotage, espionage, pre-mature deaths due to assassinations, and other intelligence activities. In one related study conducted by Petras[12], it’s perceptible that the counter intelligence body is working with other disciplines to ensure that the objectives are met in order to rule out cyberspace operations and international terrorism attacks. Here is what CI is doing to conquer the subversive practices:

Awareness creation; the first step to eradicating a problem, is knowing that the problem exists. The news about cyber space operations and terrorism have been made public to warn the people who are near and dear about what to expect while living in technologically influenced world. CI seconds this approach by supporting education provision to personnel on security matters which in turn passes the word out to places like learning institutions through safety drills. This teaches the public how to identify such cases and probable means of avoiding them[13].

Proper Security Surveillance Procedures; anything that threatens national security is on every levels positive for thorough high-level scrutiny. CI knowledge is applicable here in that it provides all the required facts concerning what to look out for in individuals and organizations who threatens United States Forces and posses a breach to national security affairs. CI involves the legal bodies when it comes to identifying and incriminating such parties[14].

Puts Forward Support that Provides Assurance on Property Safeguarding; technology advancing by the day has necessitated more than just improved ways of handling situations. Talking technology means well strategized acquisition methods and the rose to prominence of improved methods of defraud law abiding citizens’ of their properties .The cyber attacks related cases fits into this subject well enough Byman[15].  Counterintelligence has a way of addressing such situations by offering detailed knowledge that refutes illegal means of acquisition.

Conclusion

Giving reference to the unfolding previous sets of activities that bear their roots to terrorism and other cyber space operations, it’s rational enough to think that counter intelligence activities, tactics and operations have played a big role in stabilizing the security level of United States to the position it’s currently in.  This apparently means that engaging military level security on American soil has proven to be better than most approaches. The US is swimming in still waters in relation to the current escalating economic progress and reduced, close to zero terrorist bombing occurrences. Clearly the Federal Bureau of Investigations has confirmed to be committed working tirelessly to counteract terrorism and cyber attacks to normalize the states affairs.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Bibliography

Byman, Daniel. “US Counter–terrorism Options: A Taxonomy.” Survival 49, no. 3 (2007): 121-150.

Donohue, Laura. “In the name of national security: US counterterrorist measures, 1960-2000.” Terrorism and Political Violence 13, no. 3 (2001): 15-60.

Petras, Christopher M. “The Use of Force in Response to Cyber-Attack on Commercial Space Systems-Reexamining Self-Defense in Outer Space in Light of the Convergence of US Military and Commercial Space Activities.” J. Air L. & Com. 67 (2002): 1213.

 

[1] Byman, Daniel. “US Counter–terrorism Options: A Taxonomy.” Survival 49, no. 3 (2007): 121-150.

[2] Donohue, Laura. “In the name of national security: US counterterrorist measures, 1960-2000.” Terrorism and Political Violence 13, no. 3 (2001): 15-60.

[3] Byman, Daniel. “US Counter–terrorism Options: A Taxonomy.” Survival 49, no. 3 (2007): 121-150.

[4] Donohue, Laura. “In the name of national security: US counterterrorist measures, 1960-2000.” Terrorism and Political Violence 13, no. 3 (2001): 15-60.

[5] Donohue, Laura. “In the name of national security: US counterterrorist measures, 1960-2000.” Terrorism and Political Violence 13, no. 3 (2001): 15-60.

 

[6] Byman, Daniel. “US Counter–terrorism Options: A Taxonomy.” Survival 49, no. 3 (2007): 121-150.

[7] Byman, Daniel. “US Counter–terrorism Options: A Taxonomy.” Survival 49, no. 3 (2007): 121-150.

[8]Byman, Daniel. “US Counter–terrorism Options: A Taxonomy.” Survival 49, no. 3 (2007): 121-150.

[9] Donohue, Laura. “In the name of national security: US counterterrorist measures, 1960-2000.” Terrorism and Political Violence 13, no. 3 (2001): 15-60.

[10] Donohue, Laura. “In the name of national security: US counterterrorist measures, 1960-2000.” Terrorism and Political Violence 13, no. 3 (2001): 15-60.

[11] Donohue, Laura. “In the name of national security: US counterterrorist measures, 1960-2000.” Terrorism and Political Violence 13, no. 3 (2001): 15-60.

[12] Petras, Christopher M. “The Use of Force in Response to Cyber-Attack on Commercial Space Systems-Reexamining Self-Defense in Outer Space in Light of the Convergence of US Military and Commercial Space Activities.” J. Air L. & Com. 67 (2002): 1213.

[13] Petras, Christopher M. “The Use of Force in Response to Cyber-Attack on Commercial Space Systems-Reexamining Self-Defense in Outer Space in Light of the Convergence of US Military and Commercial Space Activities.” J. Air L. & Com. 67 (2002): 1213.

[14] Petras, Christopher M. “The Use of Force in Response to Cyber-Attack on Commercial Space Systems-Reexamining Self-Defense in Outer Space in Light of the Convergence of US Military and Commercial Space Activities.” J. Air L. & Com. 67 (2002): 1213.

[15] Byman, Daniel. “US Counter–terrorism Options: A Taxonomy.” Survival 49, no. 3 (2007): 121-150.