Mobile Business Intelligence Trends

Every year, business processes, organisations and industries experience significant transformations that redefine new trends. The emerging of new trends shapes industries and the way companies conduct business and realise profits. This essay covers Mobile Business Intelligence (MBI) as an emerging trend in the business intelligence and IT industry.

Issues and Audience

Established IT firms with massive resources and capabilities, such as SAP, SAS, Microsoft, and Oracle among others and start-ups, such as Softwaremaster and Roambi provide both software and hardware to run Business Intelligence (BI) platforms on smartphones, such as Blackberry, iPhone, Android-based phones and other smartphone models.

There are strong needs and interests in BI systems that operate on smartphones. However, all vendors admit that extremely few customers use their smartphones for BI purposes. This is a major challenge for the IT and BI industry.

The use of smartphone for BI purposes goes beyond mere receiving of alerts or getting pre-determined set of truncated reports (Marion, 2010). In this regard, BI players should take advantage of the GPS location chips and touchscreen features to develop platforms that support real-time data and analytical capabilities. BI systems that run on smartphone could provide real-time information, insights and trends to users wherever they are.

Industry professionals have provided their forecasts about the BI software and hardware adoption. The growth in BI software is likely to benefit retail clerks, physicians and other professionals who will rely on effective use of BI systems and their smart devices. In this regard, smartphones with BI systems will create the biggest change in the industry and increase returns on investment (Marion, 2010).

The Trend

Cosentino noted that Ventana Research completed the most comprehensive evaluation of mobile business intelligence products and vendors available anywhere by focusing on 16 technology vendors (Cosentino, 2014). The research firm assessed companies on seven main categories, which included usability, manageability, reliability, capability, adaptability, vendor validation and TCO and ROI (Cosentino, 2014). The study categorised vendors based on their abilities to supply software and hardware for MBI.

Mobile Business Intelligence Trends, 2014.
Mobile Business Intelligence Trends, 2014, source: (Cosentino, 2014).

The study outcomes indicate significant future trends in the Mobile Business Intelligence. There was a strong desire to enhance the use of data in 40 per cent of the firms that took part in the survey. However, adoption of MBI was rather slow relative to interests. Presently, less than half of firms use mobile devices to gain access to BI capabilities. On the other hand, almost three-quarters, which represent 71 per cent, assume that their mobile employees would gain access to BI capabilities through mobile devices within the next 12 months (Cosentino, 2014). In addition, the trend in MBI adoption indicated significant support from executives (nearly 50 per cent of executives acknowledged the importance of mobility on BI processes).

While there is a wide rift between actual adoption and interests, the existing gap between interests and actual usage will continue to close as many firms turn to mobile devices to facilitate business processes. Whereas penetration of MBI systems remains modest, Howard Dresner (2013) notes that firms of different sizes will continue to adopt MBI significantly by the year 2015. The increasing ease of access and usability shall facilitate the adoption of MBI systems in organisations, but many firms will perhaps not meet their goals of adopting MBI systems by the year 2015.

MBI adoption by firms.
MBI adoption by firms, source: (Dresner, 2013).

The use of foresight theory and practices to identify future trends in business processes has allowed firms to adjust their business activities. Foresight relies on gathering previous data to make future prediction and enhance strategic planning among firms. In this regard, technology firms can predict future demands for MBI hardware and software. They can also identify the most active areas in the future and adjust their business activities accordingly.

Therefore, foresight theory and practices help professionals to understand possible future trends for effective business decision-making. However, users must be aware of limitations of future trends as Dresner (2013) notes that firms do not always meet their desires in terms of BI adoptions. Overall, the emerging trend indicates that many firms will adopt MBI for business processes.

Significance

Clearly, todays mobile employees require mobile devices, which can allow them to gain access to data in a simple, straightforward manner for effective decision-making. Such needs have driven the demand for MBI hardware and software to develop intuitive interfaces. Consequently, vendors and other industry professionals need to understand future trends in the market as current studies show that MBI will redefine business practices and increase returns on investments. As a result, several vendors have emerged to fill the gap in demand for MBI software and hardware.

One must recognise that the interest to adopt MBI systems is higher than the actual adoption. Besides, many firms will not meet their adoption plans by specified periods.

This trend also raises important issues about current changes in the IT industry and the need to provide reliable solutions for end users. Therefore, firms must evaluate available MBI options in order to select only tools, which can meet their present and future needs. Companies must also consider their current vendors and understand their plans on MBI systems and mobility.

Reference List

Cosentino, T. 2014, . Web.

Dresner, H. 2013, . Web.

Marion, L. 2010, . Web.

Kinds of Big Data: Foundations of Business Intelligence

When it comes to collecting big data, the British Librarys approach can be reviewed first. IBM and the British Library collaborated to build a big data system. The Library collects large volumes of unorganized Web data to make them extracted, annotated, and graphically analyzed with the aid of IBM BigSheets (Big data, big rewards, n.d.). Customers can see search results, for instance, as a pie graph. Because it is based on the Hadoop architecture, IBM BigSheets is able to process massive volumes of data rapidly and effectively.

The following entity, State and Federal Law enforcement, collects big data to identify trends in criminal behavior that might be challenging to identify in smaller samples. This includes connections between time, possibility, and entities or less apparent connections between people and crime syndicates (Big data, big rewards, n.d.). Criminals and crime syndicates are progressively coordinating and carrying out their crimes online. With the use of new technologies, authorities may now examine data from a variety of sites and use analytics to forecast potential crime trends.

The NYPD can easily access information from the Real Time Crime Center data warehouse because of the systems search functionality. The given system was created with the collaboration between IBM and the NYPD (Big data, big rewards, n.d.). A criminals photo and details about past convictions, as well as locations and maps, may be shown on a projection screen in a matter of seconds or immediately transmitted to responding cops at a crime scene.

As for other organizations, such as Vestas, a total of 178 factors are collected. This includes pressure changes, dampness, wind speed and direction, temperatures, as well as other historical corporate data, which are stored in the 2.8 petabyte-sized company wind archive (Big data, big rewards, n.d.). Global deforestation measurements, satellite photos, geographical data, and information on lunar cycles and tides are all planned additions by Vestas in the future.

Finally, big data services are also being used by businesses to study customers perceptions. For instance, the worlds largest vehicle rental company Hertz collects information from online surveys, letters, texts, website traffic trends, and data produced at all of its 8,300 sites across 146 different countries (Big data, big rewards, n.d.). Considering that today data is stored centrally rather than at each branch, the organization can analyze data more quickly and respond to client feedback and shifts in perception more quickly.

Reference

Big data, big rewards. (n.d.). In Chapter 6: Foundations of Business Intelligence.

Business Intelligence Approaches

In the recent past, technology has increasingly been adopted in organizations. It assists in developing efficiency and thus customer satisfaction. The competitiveness of a business is vested on the quality of its management decisions. A number of systems that aim at meeting a certain objective in the business arena have been developed. They are either home-made or all user systems (commercial systems).

Business intelligence is the name used to refer to the total collection of such system; it was first coined in September 1996, in Gartner Group report. This paper focuses on how Business Intelligence (BI) tools and the nature of its operations with a business enterprise.

Business intelligence is a term used to refer to a collection of applications that aim at keeping and making available a data bank in a certain industry or organization; the bank is referred to when decisions are made. When developing the database, the initial stage is information gathering, then sorting the information, analyzing it, and finally making is accessible for use. Business intelligence can be used in the general strategy of a business or a certain area/department in an organization.

The major benefit that a company derives from using business intelligence tools in the right way is competitive advantage. This is because a firm has access to information that assist in making informed, current and futuristic decisions (Electrosmart Limited, 2011).

Business intelligence tools take two angles; custom-built tools and commercial reporting tools. Whichever the category they are meant to keep custody and give access to certain information from data warehouse maintained in a company for better decision making.

Custom-built soft wares are developed in a company and aims to keep and avail certain information, to limited people working in a certain area or organization; commercial reporting tools are developed for sale to help in a specific line of business; they are made kin such a way that they can be integrated in the system operating in a business.

An example of a commercial reporting tool is Oracle, Reporting and querying software, and ORAP. Word access (spreadsheets) fall in the category of business tool; it has the widest use. Different industry require different information, thus different system with varying levels of data rights are used.

Despite the numerous advantages that come along with an effective business intelligence tools, making a decision to implement one is a complex decision.

It requires information technology experts as well as huge capital investments. If the process is not well implemented, it can have a negative effect to a business. The initial stage when implementing one is recognition of a need situation in a business. After the problem has been analyzed, a computer expert is involved for advice/to develop a suitable package.

Advancement in technology has enabled more users friendly and result-oriented soft-wares. Companies are increasingly adopting the systems. Most big companies have gone a step ahead whereby they have an officer, in the management level who is the custodian of data and information. He is mandated with not only with the electronic data but also human data.

As employees interact with customers they are supposed to record and forward more data to the officer. The department works hand-in-hand with research and development department to ensure that the data in the system is updated (Bikson & Eveland, 1996).

Other than relying on the database alone, a tread is taking course whereby after a certain issue has been raised by employees or the research team, data is looked for. Experiences are mostly mounted together and develop a pool of wisdom that helps in decision making.

In future business intelligence will take a different approach but the baseline remains the same, providing data to be utilized when making decisions. Their continued use will lead to better ways of doing business, efficiency and customer satisfaction.

References

Bikson, T., & Eveland, J. (1996). Groupware Implementation: Reinvention in the Sociotechnical Frame. Proceedings of the 1996 Conference on Computer-Supported Cooperative Work. New York: Association for Computing Machinery. Web.

Electrosmart Limited (2011). The Business Intelligence Guide. Web.

Search for Intelligence: Acquisition of Intelligence

Carl Zimmer in his article In Search For explores an interesting topic in acquisition of intelligence. In this article Zimmer dwells on a peculiar and particular new dimension in the long history of intelligences studies. Zimmer make a concerted effort to unearth findings of scientists who are studying the relationship between genes and intelligence. Other than discovering that scientists have developed technologies that can measure intelligence variation between different individuals, scientists have now made a breakthrough in technologies that can identify thousands of different types of genes in human beings. A few scincetist have delved into the uncharted territory that tries to connect intelligences and the occurrences of certain genes.

Actually reports are telling of possible relationships between genes and intelligences. However scientists are still baffled by the new realities that have emerged. They have conclusively documented that intelligence is an observable trait in human being and can even be felt by others. However, any criteria developed to measure intelligence despite yielding valid resets are only speculatory. Furthermore all positive leads the scientists have had on linking the development of intelligence with certain genes has turn out just as false hopes. Only one lead has held true, but again with a very small percentage margin of accuracy. The more the scientists delve deeper into the subject the more blurred the findings becomes. Another interesting finding is that scientists have also connected environment with intelligence. Studies done on a set of identical twins indicates that twins raised in different environments did not vary from twin raised in the same environment. Because studies on the link between intelligence, genes and environment, have not yielded much result, scientists have expended their studies and have focused on the grey matter. In from studies and careful analysis of the brain, scientists have made certain interesting discoveries. Studies reveal that the grey matter reveals similar genetic signatures from those of average or low intelligence beings. Furthermore, the grey mater of highly intelligent people seemed to be more organized than that of people with average intelligence. They are thus concluding that intelignece development is connected to a persons cognitive function such memory, lingo skills and attention. In spite of this, any development still leads to the genes.

The strengths of the article lie in the ability to connect scientific research to the main concept. Zimmer does not only explain the theoretical framework of the link between genes and intelligence by also provides sufficient evidence from many and credible scientific researches. Furthermore, the scientists the research is an ongoing process spanning a long period of time as it studies children at their developmental stages from early childhood to teenage. Despite there only being a glimmer of hope regarding genes and intelligence it still looks very optimistic fro a breakthrough soon. The article however, highlights a number of weaknesses in the main concepts. The children involved in the studies are treated like laboratory specimen and to some extent this is unethical. Furthermore there seem to be much cynism as the author only focuses on the barriers to concept genes and intelligence. Despite the pessimism surrounding these topic scientists has a number of options that direct future research in this topic. It includes breaking done the similar intelligence pattern occurring in intelligent people. Scientist can also try to categorize intelligence an see whether nay type of intelligence occurs with certain types of genes.

Central Intelligence Agency (CIA)

Introduction

The Central Intelligence Agency emerged during the reign of President Harry Truman in 1947. Truman signed the National Security Act (NSA) which led to the creation of the Central Intelligence Agency amongst other entities. This replaced the existing Central Intelligence Group (CIG) formed by the States Secretary in conjunction with secretaries of war and navy in 1946 under Trumans orders. By replacing CIG, the CIA absorbed most of the components like the Office of Reports and Estimates (ORE).

The functions of ORE were diverse; creation of the national, economic, scientific, and technical intelligence, and coordination of the national estimates. The CIA introduction faced much hostility particularly from the military who considered that it is a tremendous threat and competitors for their operations and resources, respectively (Richelson, p. 40). This paper examines the CIA evolution and development including descriptions of how the organization could have been more effective.

CIA Evolution and Development

The evolution of the CIA did not take place haphazardly. Likewise, others systems such as the National Security Council, CIA development is understood based on three interrelated dimensions. These are the initial design, political actors influence and the exogenous events.

The structural laws contained in the 1947 National Security Act removed of the development options at the expense of others. In addition, the political influence of the president, bureaucrats as well as the policy makers helped in narrowing further these possibilities. Furthermore, the events acted as a reinforcement which entrenched the whole agency alongside the route. All together, these dimensions ensured that the concealed capabilities of CIA prospered while the coordination capabilities lapsed (Richelson, p. 39).

Internal Design

CIA development emerged from the schizophrenic design. The CIA provisions in the NSA provided the foundation upon which the agency evolved. With these provisions, the covert activities developed as the coordination capability and functionality diminished. This prevailed as the NSA concealed the whereabouts of the covert activities. Interestingly, this was boosted by additional of two other vital provisions by the NSA.

To begin with, the act empowered CIA to take control of common activities that are of concern since the NSC worked more in centralized, manner. Next, and most important, the act authorized it as a new agency mandated with power to perform functions and duties about intelligence touching national security as NSC would recommend from time to time (Richelson, p. 48).

Political Actors Influence

The original CIAs design ensured ease in creating of covert capabilities but experienced hardships in centralizing the intelligence analysis. In this respect, the political actors influence changed this into reality. The political forces, which were instrumental in this success, included the president, bureaucrats and policy makers (Richelson, p. 46).

Presidents

Presidents are amongst the significant players in CIA evolution. The presidents of all calibers have promoted and protected the clandestine operations of the CIA, for instance Truman. Truman had no faith in covert operations, but he became the first president to embrace them in war. On the other hand, President Kennedy is most renowned for his increased emphasize on the use of covert activities during and after the Bay of Pigs catastrophe. Additionally, Ford is hailed for his greater efforts in protecting the agency during the 70s. Ford strived to fend off investigations by the Congress by forming his own commission which he restricted to certain extents. This included only the abuses which had already been publicized by the press. According to him, disclosing all CIAs abuses would diminish the effectiveness of which he feared (Richelson, p. 45).

There are which are two reasons attributed to why each and every postwar president supported as well as relied more on the CIA. First, the presidents had a stronger natural incentive for directly developing foreign policies on their own without interference from the Congress. This indicates that presidents were held responsible for the successes and failures of foreign policy. Secondly the rise of the Cold War triggered the use of covert operations. With the heightened conflicts between the Americans and Soviets, each power sought the alternative to the other without using military intervention. This urgency rose with the anticipation of the nuclear war. To counteract such aggression called for a new tactic to balance between war and diplomacy. Covert operations solved this problem (Richelson, p. 36).

Bureaucrats

The bureaucrats in the larger intelligence community wanted their freedom. In this respect, they strongly advocated for decentralization of the intelligence system in 1947. Moreover, they endured the long development of the CIA system as it did not interfere with their own affairs, budgets and their people at large.

Although greater autonomy is preferred by all, intelligence was necessary to maintain their independence. As of 1948, Ferdinand Eberstadt echoed that each and every organization required intelligence based on their needs, for example, military intelligence (Richelson, p. 3).

The military has the defense intelligence which can only be interpreted by qualified military personnel. Therefore, such organizations like the military amongst others allowed the development of the CIA freely. Notably, they even supported CIA in getting the covert capabilities. However, the bureaucrats admitted that they never hoped that the CIA covert capability would grow powerful or large as it did (Richelson, p. 45).

Law/Policy Makers

The lawmakers played a role in the evolution of the CIA, though it was complex. In the first half of the evolution process, the legislators blissfully ignored the covert operations and the management challenges in the CIA. In addition, the oversight committees and subcommittees like of the Armed forces awarded the CIA little attention.

The onset of 1970s saw the law makers active participation in matters regarding the CIA such as investigating the abuses. This was boosted by the selection of new oversight committees and intensified efforts to pass reform laws on CIA particularly in covert operations and management. In regards to abuse investigation, the lawmakers relied mainly on reports from the media and the public which they then investigated but changed (Richelson, p. 44).

Exogenous Events

The exogenous events were instrumental in propelling the CIA evolution. These events included war, threats, incursions and scandals. As noted above, the prevalence of the Cold War and other alarming was on the way contributed to the evolution and development of CIA. All these events catalyzed formation of covert activities. By the late 1940s, the American foreign policy adopted covert operations as one of the major weapons of war.

In regards to war, the Cold War was the primary war that influenced the creation of covert operations. However, other wars like the Korean War played a part. Indeed, the Korean War contributed to CIA expansions on a fourfold coupled with newer emphasis about the paramilitary operations. According to Ray Cline, former Deputy Director of CIA it is during the Korean War that the CIA gained total authority, funding and real CIA mercenaries (Richelson, p. 44).

CIA operations were faced with many scandals. The Soviet threats contributed to uncovering the dirty tricks and scandals in the CIA. This puts CIA into the spot from where the covert operations were highly questioned particularly in these three events; Bay of Pigs, 1970s scandals and Iran-Contra.

However, none of these events affected the CIA covert activities but rather intensified their use. Moreover, the collapse of the Soviet Union did not affect the CIA covert operations. Instead, the agencys operations remained intact and shifted priority to other areas (Richelson, p. 47).

Increasing of CIAs Effectiveness

Since the inception, the CIA had been continually furnished to improve its effectiveness. To begin with, the CIA would have been more effective by embracing the latest technologies. This highly helped the CIA to adjust to the environment impacted by advances in science and technology. 1963 saw the creation of the Directorate for Science and Technology (DDS&T). This helped to enhance the CIAs work with new technologies and by centralizing it to one department unlike previous when it was scattered amongst other three directorates.

Proper funding of the CIA could have enhanced the efficacy. The CIA was poorly funded, not until during the Korean War. Another effort that could have boosted the CIAs effectiveness is good staffing. Furthermore, minimizing the disclosures of the CIAs abuses to the press and the larger public could have a good impact as President Ford proposed. Lastly, eliminating interference from other organs and engaging policy makers appropriately (Richelson, p. 47).

Conclusion

The CIA has undergone through a revolutionary journey since the inception onwards. This is coined towards various aspects. It all started with a provision in the NSA which laid the ground for the development. Other aspects came in later; the political actors and events, but immensely spearheaded growth. Additionally, other forces have been seen to lower the momentum for CIA development. All in all, the CIA has stood out of date.

Bibliography

Richelson, Jeffrey. The Wizards of Langley: Inside the CIAs Directorate of Science and Technology. Boulder, Colo: Westview Press, 2002. Print.

Foreign Intelligence. Operation Audrey: Briefing

Overview and Objectives

The operation under analysis pursued several key objectives. The main goal of Operation Audrey was to enhance the levels of state security and minimize the possibility of an attack from the SEMAJA. The second objective was to inspect the opportunities for recruiting Khorosani as the undercover agent who could assist the state in fighting against SEMAJA. Finally, the third goal of the operation involved the actual recruitment process and the creation of the connection between the organization and Khorasan for further management of essential information about SEMAJA.

The described objectives are essential to enhancing the levels of state security since the SEMAJA currently poses a consistent threat. It should be borne in mind that the operation in question implies multiple risks that need to be addressed to reduce the probability of a failure 1,2,3. Specifically, the introduction of information management tools that will reduce the risks of data leakage and, thus, prevent the instance of mismanaging the project will be required. Securing the location DIAMOND should be the priority currently given its further use as a safe house.

Rationale

Although the operation will require taking significant risks, it is worth performing since it is expected to improve the levels of international security extensively. Because of the increase in the political tension within the target region, it is important to control the cases that may set the precedent for a long-lasting military confrontation. The management of the threat associated with SEMAJA, in turn, is expected to create an additional environment for relieving the tension. Once the agent that has been causing an increase in the levels of threat and inciting violence on the global political arena loses a vast amount of their power, the chances for establishing a peaceful dialogue will emerge 7,8.

As a result, the described operation will minimize the probability of a military resurgence and the resulting damage to innocent citizens vastly 9,10. In addition, with the help of an agent in place in the context of the Oman environment, Europol will be aware of the key data regarding the changes in the location of SEMAJA and its intentions. Thus, the subsequent improvement in the awareness and readiness levels will lead to a better risk management approach and enhance preparedness.

Bibliography

Atelhe, George Atelhe, J. A. Adams, and S. B. Abunimye. Overview of Security Sector Reforms and the Transformation of the Nigerians Security Agencies. American International Journal of Social Science 5, no. 3 (2016): pp. 151-158.

Byman, Daniel, and Sara Bjerg Moller.  Web.

Davies, Lynn. Security, Extremism and Education: Safeguarding or Surveillance? British Journal of Educational Studies 64, no. 1 (2016): pp. 1-19.

Gerringer, Arthur E., and Josh Bart. Law Enforcement Intelligence. Journal of US Intelligence Studies 21, no. 1 (2015): pp. 75-77.

Tawil-Souri, Helga. Surveillance Sublime: The Security State. Jerusalem Quarterly 68, no. 1 (2016): pp. 57-58.

Kilroy, Richard J. No Place to Hide: Edward Snowden, the NSA, and the US Surveillance state. Journal of Strategic Security 1, no. 1 (2016): 99-102.

Landon-Murray, Michael. Big Data and Intelligence: Applications, Human Capital, and Education. Journal of Strategic Security 9, no. 2 (2016): pp. 92-121.

Nagra, Baljt, and Paula Maurutto. Crossing Borders and Managing Racialized Identities: Experiences of Security and Surveillance Among Young Canadian Muslims. Canadian Journal of Sociology 41, no. 2 (2016): pp. 165-194.

Saeh, Ibrahim, M.W. Mustafa and Nasir A. Al-geelani. New Classifier Design for Static Security Evaluation Using Artificial Intelligence Techniques. International Journal of Electrical & Computer Engineering 6, no. 2 (2016): pp. 1-8.

Yeung, Chung Yin Joanie. On the Benefits and Dangers of International Intelligence Liaison. Web.

Expansion of the American-Indians Intelligence Partnership

Introduction

The success of the United States Intelligence Community is significantly influenced by its strategies and national security priorities. The cooperation of the Community with intelligence services in other countries all around the world encourages its effective performance and contributes to the countrys dominance on the international stage. In recent years, the military, economic, and intelligence partnership between the United States and India is strengthening. The purpose of this policy paper addressed to the National Security Council is to evaluate the benefits and risks of the intelligence partnership expansion between these countries.

Indian Intelligence Services

Surprisingly, there is not enough publicly known evidence concerning the operations of Indian intelligence services. However, the intelligence agencies of this country have a long and rich history, and a cultural tradition of espionage that was used for state security occurred in the ancient era (Shaffer, 2018, p. 598). The description of a highly significant and active role of intelligence in ancient India may be found in Vedic literature (Shaffer, 2018).

Contemporary intelligence agencies appeared during the colonial period, that is why they are among the oldest similar agencies in the world. At the present day, the expansion of the United States intelligence partnership is determined by the well-developed network of Indias intelligent services. The list of Indian intelligence agencies includes the Research and Analysis Wing, the Research Bureau, the Defence Intelligence Agency, the Central Bureau of Investigation, and many other services and agencies across the country.

The Research and Analysis Wing is an external intelligence agency of India that may be regarded as the most renowned one in comparison with other services. It was established in 1968 by the government of Prime Minister Indira Gandhi following wars with Pakistan and China (Shaffer, 2018). While a prevalent number of the Indians are familiar with the United States intelligence agencies due to their popularization in cinema and media coverage, average citizens are not aware of their Research and Analysis Wing (Shaffer, 2015).

A lack of information concerning this organization is provided by the Indian governments intentional campaign to downplay and protect its intelligence agencies (Shaffer, 2015, p. 252). The Research and Analysis Wing focuses on external activity and undertakes multiple missions in cooperation with separate departments, such as the Aviation Research Centre, the Special Security Bureau, and Special Frontier Force (Shaffer, 2015). They are responsible for the monitoring of Indian borders and operations beyond the country.

The Research Bureau is an intelligence agency that is occupied with Indias domestic security. Similar to the Research and Analysis Wing, its missions and main operations are security-restricted from the public. It was founded in 1887 as the Central Special Branch and renamed in 1920 (Shaffer, 2018). While the Research Bureau primarily served as a colonial tool of repression, after 1947, it worked as a post-colonial agency that was responsible for the protection of Indias independence (Shaffer, 2018, p. 598). Nowadays, the Research Bureau is regarded as the main service for the prevention of terrorist operations in the territory of the country.

Intelligence Communitys Goals and Objectives

The activity of the United States Intelligence Community is guided by certain goals and objectives that are reflected in the National Intelligence Strategy. The recent Strategy provides the Community for the next four years with goals, missions, and strategic direction specified by the Director of National Intelligence (National Intelligence Strategy, 2019). It supports national security strategies and priorities and underlines the significance of the Intelligence Communitys activities with the responsiveness to the Constitution, Congressional oversight requirements, and other applicable statutes and laws.

According to the National Intelligence Strategy (2019), a Nation made more secure by a fully integrated, agile, resilient, and innovative Intelligence Community that exemplifies Americas values (p. 3). The purpose of the Community is to provide insightful, objective, relevant, and timely support and intelligence to inform security decisions and protect the national interests of the United States.

All activities of the Intelligence Community should be conducted according to its guiding principles. The technological superiority, national security, and economic strength of the country are advanced by the delivery of distinctive insights with objectivity, clarity, and independence (National Intelligence Strategy, 2019). The Strategy emphasizes the achievement of unparalleled access to protected information and exquisite understanding of the adversaries intentions and capabilities as well (National Intelligence Strategy, 2019, p. 3). In addition, the Intelligence Community identifies the maintenance of global awareness and influence on other nations for strategic warning and the United States superiority on the global stage as well.

The United States military, political, security, and economic implications and the ability to identify, evaluate, and respond to both regional and geostrategic shifts require the effective work of the Intelligence Community. In the information-dominant era, it should gather, analyze, and operationalize essential data to provide the country with an appropriate response to the provocations of competitors (National Security Strategy, 2017).

Intelligence is required for the innovations and modernization of military forces as modern weapon systems substantively depend on data that is derived from technical intelligence and scientific researches. It is beneficial for the understanding and anticipation of foreign doctrines and other leaders intentions as well. Moreover, intelligence provides the effective prevention of operational and tactical provocations and ensures the dominance of American capabilities.

Intelligence Partnership

The United States Intelligence Community has certain strategic and operational benefits in comparison with the intelligence services of other countries. The advantages are determined by several factors, such as the countrys supremacy provided by its economic and political development and highly sophisticated technologies and equipment for effective data collecting and advanced researches. However, the most significant reason for the Communitys benefits is a strong international partnership.

The United States cooperates with its partners and allies throughout the world for better protection against rivals. In concert with other countries, it uses the information-rich open-source environment to deny the ability of state and non-state actors to attack our citizens, conduct offensive intelligence activities, and degrade Americas democratic institutions (National Security Strategy, 2017, p. 32). In addition, the Intelligence Community fuses information from information, diplomatic, and military domains for effective performance on the geopolitical stage. However, this fusion and excessive data-sharing with other nations that advance their interest may pose a certain risk for the United States as well.

The United States works with intelligence services of foreign states to benefit its safety and provide essential links to national security priorities. As a part of the intelligence agencies international network, The United States Intelligence Community coordinates their partners efforts with virtually no transparency or accountability (Kaufman, 2017, para. 1).

The cooperation is currently dedicated to the prevention of international terrorism, and the United States is interested in receiving a new experience from its allies concerning this disturbing issue. In recent years, India and America have substantially improved their relationships and cooperated in military and political spheres. The expansion of the Intelligence Communitys intelligence partnership with Indian intelligence agencies, such as the Research and Analysis Wing and the Research Bureau, is the third stage of the partnership established between countries.

Conclusion

The United States military, political, security, and economic superiority substantively depend on the effective work of the Intelligence Community. It should gather, analyze, and operationalize essential data to provide the country with an appropriate response to the provocations of competitors. The Intelligence Community fuses data from information, diplomatic, and military domains for effective performance on the geopolitical stage.

The most significant reason for the Communitys strategic benefits is a strong international partnership as the United States cooperates with its partners and allies throughout the world. In recent years, India and America have substantially improved their relationships and established an intelligence partnership which expansion is determined by the well-developed network of Indias intelligent services. Contemporary intelligence agencies appeared during the colonial period, that is why they are among the oldest similar agencies in the world.

The expansion of cooperation in the sphere of intelligence will be beneficial for both partners. Data-sharing between American and Indian intelligence agencies will encourage the exchange of experience concerning the prevention of terrorist acts. Both countries have unique practices in this sphere as they face terrorist activities. Moreover, this partnership will provide the United States with a certain level of control and insight into a military, political, and economic situation not only in India but other countries in the region as well.

References

Kaufman, B. M. (2017). . Medium. Web.

(2019). Web.

National Security Strategy of the United States of America. (2017). Web.

Shaffer, R. (2018). Indian intelligence revealed: An examination of operations, failures and transformations. Intelligence and National Security, 33(4), 598-610. Web.

Shaffer, R. (2015). Unraveling Indias foreign intelligence: The origins and evolution of the Research and Analysis Wing. International Journal of Intelligence and CounterIntelligence, 28(2), 252-289. Web.

Leveraging the Five Intelligence Disciplines to Access the Threat and Urgency of Irans Nuclear Program

Introduction

Intelligence disciplines have become important tools in aiding collection of pertinent information that poses a threat to national security. Open Source Intelligence Service (OSINT), Human Intelligence (HUMINT), Measurement and Signatures Intelligence (MASINT), Geospatial Intelligence (GEOINT) and Signals Intelligence (SIGINT) are good examples of intelligence disciplines.

These disciplines are used by the United States of America to collect vital information regarding various nations like Iran that have been involved in manufacturing nuclear weapons that threaten the security (Rublee 2).

Applicable Intelligence Disciplines

OSINT is an intelligence discipline that scrutinizes certain materials that have been made accessible to the public. This serves as a stepping stone towards assisting the United States to collect important information available to the Iranian citizens and the world population at large.

This kind of intelligence discipline aids the Soviet Union to derive up to 90 percent of its intelligence (Rickwards 23). Further, it ensures that large quantity of data is gathered in a bid to come up with well structured information. The information should meet the threshold laid down by the advisory collector. In addition, OSINT relay vital information that exhibits the potential of the activities in an organization.

Further, the information provided pertaining that particular organization cannot be derived from any other source. This simplifies the mode of classifying data and deriving trade assets as a result of compiling an open source data. It is therefore arguable that OSINT is one of the main intelligence sources applicable in detecting early disasters through the data collected. Accordingly, collection of OSINT data is not limited.

Human Intelligence (HUMINT) is another imperative intelligence discipline which leverage gathering of necessary information regarding nuclear weapons produced in Iran. Human intelligence has been associated with open sources. The intelligence engages in obscured activities on the one hand, and the persons behind the intelligence sources on the other. It is also not in doubt that unconcealed behaviors are executed in an open arena. Various activities under the intelligence may include making use of uncategorized or forum materials.

Other activities entail working in the interrogation centers for refugees and captives of war and also debriefing legal travelers who are of interest to a nations intelligence services. Furthermore, clandestine sources relay information to a foreign nation which is imperative in providing necessary information about a nations involvement in manufacturing nuclear weapons and foreign citizens who creep into a country to conduct a research.

United States has clandestine sources in Iran that are vital in providing the nation with crucial information on Irans involvement in nuclear weapons which can be a threat to US and worlds security. Further, even with the outburst of practical aptitude in the nation, HUMINT intelligence is still in the lead in the provision of technical information that is not accessible to most technical collectors. A good example is providing information regarding the access of internal memoranda and to screen-off area information.

This is very vital for United States intelligence services as they are in a position to track information on Irans involvement in nuclear manufacturing even if it tries to conceal that particular information to the public. Moreover, HUMINT is important as it has the capability of closely monitoring the plans of the enemy. It is also used to reveal the progress of manufacturing scientific weapons prior to their usage or detection by any other technical system.

HUMINT also provides data on certain issues that entail such subjects with specific knowledge in regards to cases relating to defectors and spies. In addition, it relays crucial information to which it gained access. This is a very important step in helping United States acquire crucial information regarding Iran involvement in nuclear weapons. The intelligence discipline also deals in information that is highly regarded in interpersonal relations.

This can be critical in providing pertinent information on Iran. HUMINT is also observant on foreigners who are entering the country particularly from Iran. According to Drogin, HUMINT has several intelligence collection agents such as reconnaissance troops who are guarded and equipped to conduct HUMINT operations (5).

Under the same agency, there is the counterintelligence agency that ensures higher gathering abilities over any previous division or contingent level asset. It is of importance that the tactical level is not overemphasized with IBCT organization. This is because the CI asset organic to conventional units at the squad tactical level have the capability which is unique to IBCT and that is important in the United States Army.

Drogin further states that HUMINT has another agent known as platoon which is an element of the brigade military intelligence company (23). The said company sustains the processes and upholds a dominion connection of administrative power. The principal acumen is contained within the strategic HUMINT agencies. Once information has been collected under this agency, it is reported to the management team which analyses the intelligence data gathered by the tactical team.

This is very vital especially when collecting vital data on countries such as Iran that are actively engaged in manufacturing nuclear weapons. The Interim Brigade Combat Team (IBCT) is an operational tool under the HUMINT that revolves around collecting vital information from one level to another. The tool is uniquely designed to collect and disseminate vital information either in audio or oral form that is deemed valuable to the process. This is a very vital step in acquiring important data on countries involved in nuclear weapons.

MASINT is another important intelligence tool which influence collection of information regarding nations like Irans involvement in nuclear weapon production. MASINT is vital as a means of obtaining and analyzing data through its special technical sensors.

This is attributed to its ability of classifying the important data that is correlated with the source emitter. This is very instrumental in aiding US crack down on Irans involvement in Nuclear weapons. United States is in a position to pick out specific people involved in manufacturing nuclear weapons in Iran and ascertaining the nature of weapons produced.

MASINT has also been praised due to its unique capability of identifying important information that could not be detected by sensors. This serves as a vital step in exposing closed information regarding nuclear weapons produced in Iran. It also reveals essential information that is considered to be inferior. According to intelligence Resource Program, MASINT works hand in hand with defense department of United States to ensure a harmonization collection effort for the intelligence discipline.

This is very essential in enhancing efficient collection of information regarding Irans involvement in Nuclear weapons. Furthermore, the inception of the MASINT data management program was for the sole purpose of providing accurate information. This acts as a bigger step in aiding collection of intelligence information regarding Iran and other related nations involvement in manufacturing of weapons.

The Intelligence Resource Program, which has been placed under the responsibility of the MASINT Army, resides with the Intelligence and Security Command (INSCOM). The duty to assemble and develop data in MASINT has been placed on the scientific and technical intelligence team. The team is actively involved in its role hence portraying its ideal dedication to achieve maximum positive results in the project. This is a very vital step in collecting relevant information on nuclear.

SIGINT serves as another important intelligence discipline which is used to control collection of information about a countrys involvement in manufacturing of weapons.

This intelligence discipline makes use of certain integrated signal intercepts. The signals are used to capture messages that are transmitted in various forms. Information can also be gathered through fibre optic or such other means. Most communications under SIGINT are encrypted. They also typically require sophisticated computer technology for description which helps to maintain privacy and confidentiality of information.

United States is in a position to get vital information regarding Iran involvement in nuclear weapons by applying this intelligence discipline and through other various platforms. Such platforms include covert locations inside United States. According to Intelligence threat handbook, SIGINT can monitor transmission from community satellite as well as terrestrial facilities (OPSEC 36).

It therefore becomes of essence that the information regarding the proliferation of nuclear weapons is leveraged. The establishment of Army Signal Intelligence Service (SIS), which consolidates all operations related to the case of Iran, is in a position to penetrate easily into a foreign nation. This was evident during the World War II when the United Nation through SIS, which is operated under SIGNT, penetrated in Japan.

GEOINT has also been recognized as having a key role in the intelligence community and defense (Lahneman 23). GEOINT examines and gives an analysis of the visual account that correlates to security actions. The analysis combines all the aspects of the imagery intelligence and the geospatial news.

GEOINT uses imagery satellites to study the nuclear production in Iran. The imagery is currently obtained from an array of sensors. The imagery is vital to collect intelligent information. A proper installed imagery provides an accurate platform for targeting the weapons location. Secondly, it further gives a lee way to detect peculiar activities pertaining to the manufacturing of nuclear weapons in Iran.

GEOINT allows the intelligence team to gather and produce information in an electronic manner or optical means and further relay the information garnered on display gadgets. It is therefore arguable that the intelligence concerns itself with imagery concepts that allow for easy collection and procession of data. This also ensures easy retrieval of all imagery activities that are considered of utmost important to assess any kind of threat that has been detected.

Conclusion

It is not in doubt that Iran is still actively engaged in assembling nuclear weapons. Though it has not been directly communicated whether the weapons pose a threat to the security of the nation or not, the same cannot be dismissed. It is therefore important to collect and disseminate information relating to the manufacture of nuclear weapons. The five disciplines therefore play a vital role to ensure that the same is achieved.

Works Cited

Drogin, Bob 2005, How U.S Fell Under the Spell of Curveball. PDF file. 2 Apr. 2013.

Lahneman, William. Keeping U.S Intelligence Effective, Plymouth, 2011. Print.

OPSEC. Intelligence Threat Handbook, New York: Diane Publishers, 1996. Print.

Rickwards, James. Currency Wars: The making of the Next Global Crisis, London: Penguin Group, 2012. Print.

Rublee, Maria. Non- Proliferation Norms: Why States Choose Nuclear Restraints, New York: University of Georgia Press, 2010. Print.

IntelligenceLed Policing

The introduction to intelligence-led policing and how it has effected modern policing in the United States

This study identifies Intelligence led policing by the acronym IPL. It is a radical policing model which began in the United Kingdom.

It is an intelligence-based policing method whereby law enforcement operations are guided by crime analysis techniques, data collection and accurate interpretation of events based on foreknowledge within a given crime environment.

Legal and security scholars attempt to define intelligenceled policing based on their respective views. However, it appears that there is yet to be a globally accepted definition of the concept of ILP since its inception because of its complex and dynamic nature (Lyman, 2010).

The United States accords priority to national security. Policy makers tend to believe that a discreet policing strategy is essential in revealing clandestine high-profile organized crimes.

Modern policing approaches inspire the development of a new format and application process that assumes an entirely different dimension. They lead to the research for new ideas on the law enforcement mechanisms.

This study observes the need for new realistic changes in policing methods in order to eliminate the inadequacies and challenges of former surveillance methods.

Policy makers underscore the need for innovations and legal frameworks to deal with criminal activities in the contemporary period (Osterburg & Ward, 2010).

How the events of 9/11 and post 9/11 led to the inception intelligence-led policing in the United States. The role of intelligence-led policing in the United Kingdom and how it influences intelligence led policing in the United States

The 9/11 terrorist attacks revealed new security challenges that appeared to be beyond the capacity of the policing innovation of previous decades. Policy makers and intelligence experts arrived at the decision that the nature of criminal activities had become complex. This aspect required a new era of intelligenceled policing.

The ILP as a policing model utilizes assessment and risk management approaches. The post 9/11 security study led to the creation of the Department of Homeland Security in the US (Rangel, 2010).

The terrorist aggression against the US government and authorities oversaw the need for countries to unite against criminal activities.

World states condemned the terrorist act and called for enforcement bodies to formulate global collaboration efforts to enable sharing of intelligence and data regarding terrorism and other crime issues.

This paper suggests that this global partnership foster an environment of collection of significant data relating to identification of potential security threats, and information sharing with international security agencies. Policing strategists and experts agreed on the need to create efficient crime analysis processes.

However, the US and her allies in the fight against global terrorism had to look for cost effective and efficient intelligence led policing. Amy Zegart in her book Spying Blind, revealed how prolonged organizational challenges prevented the FBI from exploiting opportunities to prevent the 9/11 attack (Thompson, 2012).

Jerry Radcliffs in his book Intelligence Led Policing (2008) propounded the 3 -1 model of ILP. He analyzed this model into three basic units which include crime intelligence analysis, decision making and criminal environments. In practical terms, these three basic units are encapsulated in the 3-I formation model that stands for interpret, influence and impact.

The First Amendment to the US Constitution features in the Bill of Rights. It prohibits against the formulation of laws that negate the free affiliation of US citizens to religious organizations and freedom of expression. The statute allows citizens to exercise peaceful assembly and to freely express their grievances.

The Fourth Amendment to the US laws forbids against illegal searches and seizures of the property of citizens of the US. It dictates that the police provide a search warrant as a requisite measure to any search.

This evaluation shows the challenges that the US government faces in light of upholding the law in an environment of complex terrorism difficulties. The US and other world states ought to uphold the rights of their citizens but at the same time prevent terrorism occurrences.

Terrorists may exploit the law to safeguard themselves from prosecution. For instance, a criminal may obtain a court order to restrain the police from searching or seizing equipments meant for criminal activities.

He can also continue to seek for support from his accomplices using the law because the statutes uphold the freedom of assembly and speech.

Intelligence led policing is a surveillance measure that is founded on evaluation, risk assessment and establishment of ways on how to manage and prevent criminal acts from occurring. Intelligence officers uphold the responsibility of managing the initiative.

The US and UK governments developed the approach in 1990. Law researchers in both countries agreed on a process of reducing disagreements among law enforcement, intelligence and police units. Recent threats and terrorist attacks in the US led to a re-evaluation of the concept.

Other world states also embraced the mechanism. Intelligence led policing may be a complex initiative in light of recent security trends. It improves conformity of law enforcement units to regulations. Intelligence led policing in the US must be guided by compliance to the First and Fourth amendments to the US Constitution.

Government units can neither conduct illegal nor prevent citizens or immigrants from exercising their freedom of worship. They must work closely with the community to achieve their objectives (Yunker, 2010).

The connection between intelligence, community, and problem oriented policing

Unlike the community process of law enforcement, intelligence-led policing does not entirely depend on the community to determine sensitive and delicate crime situations.

Due to reduced police presence in the community setting, people tend to uphold the idea that visual policing enhances efficient use of resources, and is more effective in the crime reduction exercise.

Community intelligence policing relies heavily on the society for intelligence information and inputs that serve as a guide for intelligence operations. Nevertheless, this paper notes that the resources available to the local police are often minimal at the community level.

Osterburg & Ward (2010 P. 27) describe a problem oriented policing as  a policing strategy that involves the identification and evaluation of particular crime and disorder challenges in order to create an effective response strategy in conjunction with ongoing assessment.

This paper links various types of crimes against humanity to be the direct cause of the destruction of lives and valuable properties. Surveillance strategies focus more on the nature of policing rather than its effects.

Osterburg & Ward (2010) further demonstrate that radical measures in policing methods may replace the outdated crime-driven standard model of surveillance approach with a strategic monitoring system.

The change may require that the US government equips the policing organization at this level with adequate resources needed to effectively deal with both small and large scale civil-oriented crimes like armed robbery, burglary, homicide, drug and human trafficking and kidnapping.

Intelligence led policing at the municipal level and the massive New York City Police Department Intelligence Unit

The US government formed the New York City Police Department (NYPD) in 1845 with about 34,000 uniformed officers under its payroll.

The NYPD adopted an aggressive motto in Spanish Fidelis ad mortem which when translated into English means faithful unto death. Phillip Banks currently heads the NYPD. He holds the capacity of Chief of Department.

The NYPD is known to be the largest municipal police organization in the United States with critical roles of legal implementation and investigation within the five units of New York City.

This paper suggests that it may be the oldest police unit in the US. Security analysts may use its model as a basis for creation of new policing systems.

The NYPD has a broad spectrum of policing responsibilities which include Emergency Service Unit, K-9 harbour patrol, air support, bomb disposal, counter- terrorism and criminal intelligence.

This paper underscores the idea that the NYPD is a police unit created for effective municipal policing. The New York City Transit Police and New York City Housing Authority Police Department are fully integrated into the NYPD.

The NYPD proves to be an important tool that enhances the success of intelligenceled policing at the municipal level. Intelligence-led policing at the municipal standard may be equated to the ILP at the community level.

Their mode of operation uses the same principles which are mostly based on sourcing intelligence information from the community.

They depend on inputs and information provided by the people in order to determine suitable strategies to employ in dealing with a particular crime. The people depend on the police for information on how to secure their lives and property.

Constitutional implications that could result in misconduct with regard to ILP

In 1791, the First Amendment Bill was adopted by the US government which comprised of the Bill of Rights. Under this amendment, the government of the United States guaranteed liberty to its people to exercise their rights, freedom of speech and upheld the authority of the press.

However, in 1833 there was a situation that had to be addressed by the Supreme Court. The case was presided over by Chief Justice Marshall. The judge had to decide whether the Bill of Rights also applied to the states. The police usually perpetrated massive human right violations at the state level.

Disappointingly, the judge refrained from upholding the Bill of Rights at the state level stating that the founding fathers of the United States did not recommend that the Bill of Rights should equally apply to the states.

Marshalls ruling led to confusion over the interpretation of the law. The US Constitution seemed to state a particular subject which could be interpreted otherwise.

Law enforcement agencies, public policymakers, and the judiciary usually relate issues of national security with the repression of the freedom of speech of citizens or the press.

The Bill of Rights may continuously be disregarded due to issues of national security. Apparently, the state concentrates on empowering the police and other arms of law enforcement.

The history of the United States internal affairs showed that the Bill of Rights had no relevance at the state level. In 1868, James Madison passed the Fourth Amendment into law. The Congress adopted it. Public observers believed it was a step in the right direction to reinstate the ideals of human rights.

The Bill was meant to restore and entrench the liberal philosophies of the United States system of governance that was embedded on the freedom of speech and the press.

However, the state agencies did not comprehensively adopt the Fourth Amendment. They had also disregarded the First Amendment. Subsequently, the Bill of the Espionage Act was also signed into law in the year 1917 prior to the First World War.

This law employed authoritarian philosophies in the way in which the state executed it. The Espionage Act authorized secret service police units to arrest and prosecute 2000 people that had condemned the war. Eventually, 900 of them were convicted.

A relevant case to this study involved a filmmaker in 1976 who directed a movie that highlighted British atrocities against her colonies. The filmmaker was sentenced to 10 years imprisonment.

Experts on constitution matters noted that the First Amendment was not accorded any preference in light of national security. Finally, in a book, The CIA and the intelligence cult, co-written by Victor Machetti, a former CIA agent and John Marks, a journalist, certain accusations were made against the CIA.

The book pointed out that a number of operations carried out by the CIA did not fulfil the requirements of the United States. The CIA filed a case against the publishers demanding the withholding of the publication of the book.

The agency complained that a particular part of its content was sensitive to national security issues. According to the doctrine of no prior restrain, the powers of the First Amendment seemed limited even before their actual implementation.

How police officers can reduce possible intelligence violations through training

Intelligence-led policing continues to gain worldwide acceptance in many countries in addition to the US and UK. Certain experts hold the view that the model can be effective in policing across the world.

However, while policy makers and police organizations wholly recommend this model as the most appropriate in the modern era, they should also recognize that it is a system developed and operated by humans. It cannot, therefore, be devoid of flaws (Kinzer, 2009).

In the execution of intelligence-led policing operations, a scenario can be created whereby the police wittingly or unwittingly violate the law. Intelligence police agents may exercise uncontrolled authority that may lead to unethical intrusion into peoples privacy, and human rights abuses (Landsburg, 2010).

Therefore, recruits into intelligence organizations ought to undergo specialized training for a particular period. The law enforcement hierarchy should have a system in place that oversees intelligence operations and develops mechanisms to control misconduct by police agents.

Additionally, a continuous learning process mechanism and regular orientation can be vital for proper knowledge development in ILP. In the organizational hierarchy of intelligence policing, inexperienced intelligence officers should be made to undergo a continuous vetting process.

The state should enact a suitable feedback process whereby intelligence agents report to their superiors while the superiors report to the presidency or senate (Edwards, 2010).

The importance and need for continuation of ILP

This research cannot overemphasize the need for the continuation of ILP. Terrorism activities and crimes against humanity continue to cause deaths across the globe. Anti-terrorist units could have prevented the 9/11 and other terrorist attacks had they employed efficient intelligence led policing strategies.

Intelligence policing is no longer considered a specialized duty reserved for security analysts or intelligence units. Intelligence-led policing is vital for the effective functioning of problem-oriented, community and municipal policing structures.

The continued and sustained practice of ILP may not only guarantee national security but also ensure crime control and prevention at all levels of society. The state needs to allocate adequate resources to technological and research oriented ILP.

A terrorist usually exploits any opportunity to commit a crime in a state system that contains security gaps. ILP offers a new integrated dimension in the fight against crime. It gathers information about terrorism activities from the citizens. A terrorist thrives among people in the society.

They socialize and, use local facilities and, therefore, the people who may give accurate accounts about them comprise of people who live with or near their residences. The US government ought to adopt legal protection mechanisms to safeguard citizens who provide crucial information about criminal activities.

Privacy concerns in IPL

Security information extracted from any source ought to be handled with absolute secrecy. This aspect is necessary in order to prevent a situation where criminals access intelligence information and use it to outdo the police.

Intelligence reports or data should not be made available to unauthorized persons, or people who may not be connected directly or indirectly to intelligence organizations.

In recent times, Edward Snowden, a contract employee at the National Security Agency (NSA) provided data on the Agencys broad-scale information collation on Americans, known as Top Secret Documents which he copied into a USB drive. The secret military networks had banned the use of the device.

Security information, data and intelligence equipment of any form should not be exposed to external systems (Christensen & Overdorf, 2011). The US government should create punitive measures against government officials who divulge security information to outside sources.

Conclusion

The ILP system is an innovation in policing that has proved to be very effective in combating crime in the society. The state must conduct additional research in order to develop new knowledge in the fight against terrorism. It must also create relevant legal mechanisms that uphold the First and Fourth amendments.

The state must fight crime within the law. One of the ways that the state may employ in the fight against crime includes community policing (Art & Jervis, 2011). The government must create trust within its citizens in order to actualize intelligence led policing.

It ought to harmonize its monitoring and evaluation structures and allocate adequate resources in the fight against crime. Intelligence units must also integrate appropriate communication mechanisms to allow citizens to provide information without revealing their identity.

This effort requires adoption of technology based policing. Coded language ought to be comprehensively investigated especially internet based information.

This paper underscores the need for governments to create technological surveillance structures. The government must create a unique unit within the police hierarchy to track external communications.

The 9/11 attacks may not have happened without coordination and communication by the terrorists with the outside world. The US government may also employ tracking devices to detect explosives and bomb making materials in all transport systems.

References

Art, R., & Jervis, R. (2011). International Politics: Enduring concepts and contemporary issues (10th ed.). Boston, MA: Longman.

Christensen, C., & Overdorf, M.(2011). Meeting the challenge of disruptive change. Harvard Business, 78(2), 67-76.

Edwards, S. (2010). Left Behind: Latin America and the False Promise of Populism. New York, NY: John Wiley & Sons.

Kinzer, S. (2009). Overthrow: Americas Century of Regime Change from Hawaii to Iraq. Northern California, NC: Times Books.

Landsburg, S. (2010). Fair Play: What Your Child Can Teach You About Economics, Values and the Meaning of Life. New York, NY: Free Press.

Lyman, M. D. (2010).Criminal Investigation: The Art and the Science (6th ed.). New York, NY: Prentice Hall.

Osterburg, J. W., & Ward, R. H. (2010). Criminal Investigation: A Method for Reconstructing the Past (6th ed.). New York, NY: Anderson Publishing.

Rangel, C. (2010). The Latin Americans: Their Love-Hate Relationship with the United States. New York. NY: Harcourt Brace Jovanovich.

Thompson, A. (2012). Strategy: Core Concepts and Analytical Approaches (6th ed.). Web.

Yunker, J. (2010). Economic Justice: The Market Socialist Vision. New York, NY: Rowman & Littlefield, Inc.

Intelligence Collection Types

Intelligence is the know-how of an issue. Business intelligence, for example, understands business practices. Determination of Intelligence classification is according to the field in operation.

However, the intelligence community refers to a community of government operatives who work to unearth information from the society, economy and political structure, issues that are meaningful to a nations security.

The data collection may be within or outside a countrys borders. The intelligence community has several modes of intelligence gathering ranging between covert and overt operations. The intelligence community collects information in five main ways/disciplines.

Human Intelligence is the collection of intelligence from human sources. The collection, therefore, is either with direct knowledge of the collection by the source such as through interrogation or without their knowledge through clandestine means.

It is a valuable source of information: especially in regard to the wealth of knowledge, it can provide. It also requires less massive investment, unlike other collection disciplines. This, however, is at the behest of source reliability, since, evidence from other intelligence collection disciplines is usually a prerequisite before putting it into use.

Secondly, human rights abuses at the hands of interrogators may arise while covert operatives essentially put their lives in danger in the course of an operation.

Signals Intelligence gathering is through privately obtaining signal transmissions, which may be inter-party/interpersonal communication (communication intelligence) or electronic signal interception (electronic intelligence).

Communication intelligence is through tapping conversation between two or more parties, such as tapping emails or cell phones. Electronic intelligence is the collection of information through analysis of electronic signals such as radar information. Especially in electronic intelligence, it is accurate, with modern technology; however, this can be subject to tampering.

Imagery Intelligence collection is through photo imagery. Accomplishment of this discipline is through aerial photography or by satellites.

In modern times, apart from collecting information about physical structures and ground movement, through appropriate technology can gain additional information such as the number of people within buildings through assessing heat signatures or even the radiation levels at a nuclear plant.

However, this would require low flying aircraft in enemy territory, which is dangerous and may provoke war. Therefore, in cases where countries are not in conflict, satellite photography is the choice of use for imagery intelligence but can be limiting as it provides only physical structure and ground activity.

Therefore, imagery intelligence is a discipline whose impact is primarily in the provision of areas of speculative activity, backing up other intelligences while guiding plans of military action.

Measurement and signature intelligence goals are to collect information about nuclear radiation and weaponry through analysis of electronic and image intelligence. Nuclear activity at nuclear plants involves enrichment of uranium to obtain energy.

The enrichment process of energy production and development of nuclear weapons produce different radiation levels. This is through analysis of ground activity near a nuclear plant by identifying component of new materials brought to the plant. Additionally, information collection of radiation levels in the course of enrichment is of the essence.

Satellite intelligence can collect information about ground activity while imagery intelligence can collect radiation at such a plant. Especially in enemy territory, collection of radiation levels at such a plant by aerial methods may be too risky; thus, satellites have to do, which is speculation on possible activity at such a nuclear plant.

Assessment of weaponry is through satellite details of military barracks. This, too is speculative as actual weapons production may be within buildings and weaponry magnitudes are not assessable by identifying ground activity at barracks.

Open-Source Intelligence collection is from public information such as from media, public records, industrial and professional data. The amount of information in the public spectrum is wide; therefore, intelligence collection is tedious.

It may reveal information gems through statistical trend analysis, for example, which may identify potential hot spots. With such information, it can now guide other intelligence efforts of the government, such as imagery intelligence and human intelligence. It may further provide information on potential accomplices of a suspect.

Also enables the government to select a covert operative that will fit the appropriate profile of an accomplice. However, trend analysis is not a truly accurate tool, but use of technology such as supercomputers can boost ease of collection and accuracy of assessment.