Monday, May 20, 2019

Literal Intelligence Collection

Literal Intelligence Collection National Intelligence and the NSA wireless pester program Intelligence Collection Sources and Ch wholeenges February 13, 2012 In the aftermath of 9/11 the password information conjunction (IC) matte up pressure from all directions. Employees of the IC, Congress, and the general public wanted questions answered as to why our nation didnt write out an attack was imminent. This failure of cognition caused a shake up within the entire IC, leading to galore(postnominal) proximo changes. One such change was in communications intelligence (COMINT) collection.According to Cummings (2006), President George W. scrubbing said that he authorized NSA to interpose the intertheme communications of people with known links to al Qaeda and related terrorist organizations in the weeks following the September 11th terrorist attacks (p. 6). The Presidents decision had legion(predicate) repercussions. I will discuss the parameters of the decision, the management issues associated with it that lead to such controversy, and the impact it had on national intelligence and the NSA.What led to this drastic decision by the U. S. President? The United States was blind-sighted in the September 11, 2001 terrorist attack which resulted in the death of 2,977 innocent Americans. This was the largest attack in the history of the U. S. on our soil and although the signs were there for the intelligence participation to see, it was mi sendnly not put together. Much of the attack stemmed from communications between terrorist or those connected and working with terrorist within our Country, and this was unacceptable.In stage to defend against such communications, according to Lichtblau & Risen (2005), Under a presidential order signed in 2002, the intelligence agency has monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three ye ars in an confinement to track possible dirty numbers linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domesticated communications.The sole purpose of the NSA program was to safeguard our national security in a to a greater extent expansive, efficient manner. The center on law and security (2007) states this requirement to demonstrate all of the substantive and adjective elements of FISA to the Attorney Generals satisfaction before any control can begin, would fatally impair the Presidents ability to book out his constitutional responsibility to collect overseas intelligence to protect our Nation from attack (p. 9).Any writ of execution involving citizens privacy is assured to draw controversy, and the root of the riddle with this program was a management issue. The President, DCI, and the director of the NSA should have informed the head of the Senate Select and Congressional oversight committees with a more in sense understanding of the changes and the secrecy. A plan should have been in place to deal with leaks to the public of the changes, and a more detailed description of the amendment to the policy should have been created and kept under lock and key.Intelligence collection involves umpteen activities that citizens (lacking all of the facts), may deem unconstitutional. The problem with this is most of the time the facts are not available to the general population, media, and up to now certain members of the Congressional oversight committees, for fear of an operation leak. Much of what the IC does must remain secret, at least until the aftermath (which could be years later). In regards to the topic at hand, sanction of warrantless wireless intercept by the NSA, the main problem arose due to management failures in the implementation of such a disputable topic.The center on law and security (2007) states, Critics of the NSA program do not necessarily object to the part of surveillance, but rather to the way in which it has been authorized, and to the absence of any oversight (p. 10). The Congressional oversight committees divine service as a checks and balance to the IC and the President informed the heads of the committees ( coterie of Eight) of his plan to authorize wireless intercepts on Americans. Cummings (2006) states, the administrator branch had limited its briefings of the legislative branch to the conspiracy of Eight.They further asserted that the executive branch had prohibited them from sharing any information about the program with congressional colleagues (p. 7). In the aftermath, it seems the Gang of Eight did not understand the necessity of secrecy tin can this information. The President should have explained the reasoning behind the secrecy and why the information was limited to the Gang of Eight. If the Gang of Eight understood the parameters and restrictions in place, they could better defend the plan when future problems arose. Preparations hould have been in place for dealing with the public if and when the time came that the media caught farting of the wireless intercept. At more or less point the President should expect that the public would have to be address with some details defending his actions. There should have been regulations in place, describing the limits the NSA still had to endure when it came to U. S. citizens. When reports came out in 2005, there was much confusion as to what exactly the President had authorized, and if there were limits in place for the NSA. A failure to properly address the issue allowed the media to run wild with stories, further outraging critics.Silence and secrecy only added to the problem of distrust of the IC. In preparation, President Bush should have had a detailed description of the amendment to the policy, with restrictions still in place for the NSA. This policy should have been dated at the time it went into effect, signed by the President, the DCI, the Director of NS A and the Gang of Eight and kept in the possession of the Director of the NSA. Having a signed document would serve the future purpose of showing there was knowledge of the parameters of the amended policy.If this policy had to become public (open source) at some point, it would hopefully show that Management had made an organized effort of implementing change and involved as many officials as possible under the current circumstances. The National Security Agency (NSA) has the task of protecting U. S. national security systems through the use of signal intelligence (SIGINT), to include COMINT. Prior to the President giving authorization to warrantless domestic eavesdropping following 9/11, the NSA had to obtain a court approved warrant in order to eavesdrop on a U.S. citizens communications, otherwise known as a FISA (Foreign Intelligence charge Act) warrant. According to the center on law and security (2007) FISA warrants require probable cause to suspect that an respective(preno minal) is acting either for a foreign power (including terrorist organizations) or as an agent of a foreign power, a target (a cell phone, a computer, a BlackBerry, or a landline phone, for example), and that foreign intelligence be a significant purpose of the warrant (p. ). NSA is no stranger to negative public lore regarding their unconstitutional practices. This wireless intercept program put the agencys reputation at stake once again. Reports of the NSA having access to most Americans phone records detailing their calls and communications is cause for reverence for critics. Due to a lack of proper implementation, notifications and opportunity for oversight, the NSA and the IC has to climb another uphill affair to win back the trust of Americans.Dilanian (2011) states, U. S. intelligence officials insist that the new surveillance powers have been crucial to taenia terrorist plots. Hopefully, some of the more recent successes in the community can erase the impact of failures a nd the intelligence community can improve their reputation once again. References Cummings, Alfred (2006). Statutory procedures under which Congress is to be informed of U. S. intelligence activities, including covert actions NSA domestic surveillance.Congressional Research Service Dilanian, Ken (2011). 9/11, ten years after, more surveillance A legacy of watchful eyes The government eavesdrops on U. S. citizens as never before. Los Angeles Times Aug 30, 2011. Tuesday alkali Edition. Lichtblau, E. & Risen, J. (2005). Bush lets U. S. spy on callers without courts. The New York Times, Dec 16, 2005. doi 942423341 The Center on lawfulness and Security at the NYU school of Law (2007). The NSA wiretapping program. For The Record, 1(Jan) 1-16.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.