Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
From the paper "The Target-Centric Approach of Intelligence" it is clear that in Iraq, there have been claims and evidence of suspected CIA spies who have been captured and tried or executed by the Iranian authorities under the claim of sharing privileged information with the USA…
Download full paperFile format: .doc, available for editing
Extract of sample "The Target-Centric Approach of Intelligence"
CAPTURED SPY Captured spy The term intelligence in the simplest and most basic sense and aspect refers to privileged information that country, person or an organisation could retrieve from their perceived enemies or targets. It also refers to the willingness and ability to obtain information from prospective enemies or places or people who are targeted. In the recent past, the enemies of potential threats such as terrorist and other targets have been changing their approaches and patterns, so it has enforced government security apparatus and agencies to change their modes and form collecting treating and analyzing such intelligence. This is the instance where the target-centric approach comes to play since it is an improvement to the traditional intelligence cycle (Ford, Kraft & Tewari, 2003). This exposition will thus explore and articulate some of the benefits and advantages that the target-centric approach has.
To begin with, the target-centric approach of intelligence is beneficial since it identifies the primary target and locates him or her. This is an advantage because it allows the security apparatus to narrow down the scope of the search or information source. It goes without saying that instances of wrong information or intelligence has been recorded in the past due to mistaken identities or erroneous targets. Thus, this approach gives emphasis in trying to find or identify the target ensuring the successive steps of the intelligence ratification are genuine and accurate. The only set back is that it may be time consuming and create bureaucracies to clear the target if it is a person.
Secondly, it calls for the notion of putting the identified target under strict surveillance to make sure the target does not metamorphosize or change. This process or technique is called fix and it is an advantage of the target-centric because it enables the intelligence agency to make the necessary move if and when the target has been confirmed as valid or true.
The next step and process is called finish, where a combat or an assault team is assigned to kill or capture the target accordingly. It is important to note and mention that once the target has been identified and monitored, it becomes easy to move in to either capture or kill the target. The next step is called exploitation of the intelligence material mined or secured once the target has been captured or killed, it is interrogated or secured and proper information taken from it. Lastly, the target-centric approach strives to analyze the information so as to study and examine it for any prospective commonalities (Gotz, Zhou & Wen, 2006).
The commonalities could come in the form of future or successive target opportunities and prospects. It is an advantage or a beneficial edge because the information analyzed would give useful insights and tips regarding any future targets in case there is any. In practice, this model is a closed or continuous model which is conjoined in all its parts and aspects or levels. This is an advantage because it gives the whole intelligence agency or team a chance and opportunity to review the success or failures of the mission. This allows for any improvements or changes that may be effected in future or subsequent times. Thus, if the process was a failure, necessary and appropriate methods and techniques would be taken to improve that anomaly.
Part II
The term a spy in the most basic and simplest meanings refers to an officer or a person who is basked with the role and duty of collecting information or intelligence on behalf of another agency, country or government. It would also mean and refers to a person who is charged with the duty of collecting and gathering information about a rival or an enemy of a person so as to use that information or intelligence to form a competitive edge over and above the enemy. In the recent past, there have several spies who have been captured, apprehended or killed. Before the capture, apprehension or killing or murder of such a spy, it usually takes the host country, agency or government some degree of effort to blow and uncover the hideout of the spy.
The United States of America just like any other country in the world has suffered breaches in the name and form of spies being uncovered and captured (Fischer, 2008). Historically, conflict such as the cold war with Russia and the Soviet Union as a whole presented a prime position and target for spying. This was done by efforts of the military planes, infiltrating the government agencies and collaborating with the allies through their foreign intelligences services. During the cold war, the United States of America established and developed properly customized military planes to survey the military areas and any geographical locations of the soviet armies. Those planes flew at high altitudes and were supposed to be immune to any Soviet anti-aircraft defense mechanism. The military planes were supposed to take photographic images of the military zones and regions or establishments of the Soviets.
In the recent past, there has been a wave of terrorism and the United States of America has endeavored to dismantle the terror hideouts and training grounds. Thus, the government has employed drones and high powered satellites videos or cameras to view and asses those targets. It the rule of the thumb in intelligence that their operations are shrouded in utmost secrecy and confidence and classification. This happens in such a way that only classified or authorized people are allowed access to the historical targets.
A practical case and instance is the Osama Bin Laden operation which was spied and intelligence collected over utmost secrecy even to the Pakistani government. In some other instance, the US government buys or poaches people who work for other governments such as nuclear plant. Scientist in Iran have been linked and termed as spies for the CIA and US government as a whole. The buying or contracting of the services of such people is usually done if the CIA or any other intelliegence agency finds it difficult to penetrate and implant their own officers in the targets operations (Handel, 1987). In brief, the historical targets for spying all over the world include the terrorist establishments, their training zones, the military bases of perceived enemies and the nuclear plants where nuclear weapons could be developed or made.
Part III
It is important to note and mention that sometimes, the spy programs and operations do not go according to plan or book and the cover of the spies becomes blown. It is regrettable to note and mention that such spies are at times, killed or tries and convicted by the hosts nations if they realize and prove such a person to be guilty of espionage under their national laws and policies or constitution. Historically, the United States of America has also suffered casulties in terms of the number of its spies who have been captured in foreign soils and jurisdictions. To begin with, in 1962 one Francis Gary Powers who was an American pilot flying a spy plane over the Soviet Union’s areas was shot down and captured.
The capture case in the wake of the aftermath of the Second World War where sharp daggers and lines of conflict had been drawn. The allied forces led by the United States of America was opposed to the Nazis who were supported by the Russians or the Soviet Union at that point in time. Thus, when the war came to a close, there was tension and an urge to revenge by the Soviet Union who apparently lost in the fight. Thus, the United States of America saw it wise to continue with spying the soviets just in case they were regrouping with the intention of retaliating or hitting back the United States of America and their allied forces (Gaddis, 2006).
It is against this backdrop that the soviets also developed defensive mechanisms to cover and spy against the USA since the US also sent spies to Russia. In the year 1960, the CIA spy plane which was being flown by Francis which was perceived to be beyond the reproach and harm of the Soviets was shut down by the soviets. The pilot and the plane was captured by the Soviets and he was tried and convicted under the Russian laws where he was to serve time in prison. However after some time, he was exchanged for a Russian spy who was being held by the American. It is important to note and mention that the exchange marked one of the most dramatic tone down in terms of tension as the two countries seemingly forged a new relationship of peace and cordial existence.
In other instances and countries such as in Iraq, there have been claims and evidence of suspected CIA spies who have been captured and tried or executed by the Iranian authorities under the claim of sharing privileged information with the USA (Chesterman, 2006). The main reason as to why the CIA sent spies to the nuclear plants is to ascertain with utmost certainty if Iran or any other country is developing nuclear weapons which may be dangerous if they ever fell in the hands of the wrong people.
References
Chesterman, S. (2006). The Spy Who Came in from the Cold War: Intelligence and International Law. Michigan Journal of International Law, 27.
Fischer, B. B. (2008). A Review of:“Their Germans and Ours” Paul Maddrell: Spying on Science: Western Intelligence in Divided Germany 1945–1961. Oxford University Press, New York and Oxford, 2006, 330 p., $99.00.
Ford, D. A., Kraft, R., & Tewari, G. (2003). U.S. Patent No. 6,606,644. Washington, DC: U.S. Patent and Trademark Office.
Gotz, D., Zhou, M. X., & Wen, Z. (2006, January). A study of information gathering and result processing in intelligence analysis. In IUI 2006 Workshop on IUI for Intelligence Analysis.
Gaddis, J. L. (2006). The Cold War: a new history. Penguin.
Handel, M. I. (1987). Introduction: Strategic and operational deception in historical perspective.
Read
More
Share:
CHECK THESE SAMPLES OF The Target-Centric Approach of Intelligence
The analysis is conducted with a view to identifying the intelligence process, models and sources of intelligence, and organizational functions and structures existing just prior to the 9/11 attacks.... By reference to the OIG's Report and drawing on Clark's target-centric analysis this study identifies the main purpose of intelligence analysis and how intelligence analysis failed to meet its objective.... Following a joint inquiry with respect to the 9/11 terrorist attacks, Congress requested that the OIG conduct an investigation with a view to determining whether or not CIA officials and personnel in charge of intelligence gathering and analysis prior to and during 9/11 were and are responsible for failing to execute their duties satisfactorily....
However, one of the significant post-9/11 changes made to the intelligence cycle was the outsourcing of intelligence to the private sector.... This is problematic since analysts are required to make informed assumptions on the basis of information received from all the various sources of intelligence.... 0 The outsourcing of intelligence functions to the private sector can only serve to further fragment the collection and... The conventional intelligence cycle is characterized as fragmented and Clark argues for a more conjoined intelligence cycle under what is described as a target-centric approach to intelligence collection and sharing....
Introduction The article “intelligence Estimates: How Useful to Congress” by Richard A.... discusses National intelligence Estimates (NIE) produced by the intelligence u (IC), which are to some extent problematic and tend to question their usefulness to the Congress.... Summary This section of my paper will be a summary of the article “intelligence Estimates: How Useful to Congress”.... National intelligence Estimates (NIE's) entail the collection or analysis of trends that are difficult and extensive to understand....
Analyzing these pieces of information using i2 Analyst's Notebook, whose functional features include visualization of intelligence information, analysis, and communication of the intelligence, identifies SAP's focus on the Port Eyer region with movements closer to the port and a base at Banes.... "intelligence Problem Posed on the Federal Republic of Ysla by the Sovereign Autocracy of Penin" paper analizes the case which involves a threat from SAP that is currently at war with the Federal Republic of Ysla....
Target centric is a form of intelligence analysis approach that was introduced by a scholar named Robert m Clark while writing his book titled ‘Intelligence Analysis' ( Clark, Page 27-83).... The goal of centric intelligence analysis method is to clearly redefine the process of intelligence analysis in a thorough and complete manner.... This it achieves through bringing various parts of the intelligence analysis Insert Target centric is a form of intelligence analysis approach that was introduced by a scholar d Robert m Clark while writing his book titled ‘Intelligence Analysis' ( Clark, Page 27-83)....
This essay "The Exploration of intelligence Operations" concerns the idea of intelligence operations.... provide an argument for the concept of intelligence-Led Policing (ILP).... Clearly, Clark demonstrates that the concept of intelligence led policing defines a finer and more effective intelligence intelligence-led guarantees increased security and reduced crime (102-105).... As the author puts it, the recent security threats have defined the need for enhanced intelligence operations in the police service leading to numerous efforts aimed at enforcing intelligence....
The model should involve all the stakeholders affected by the intelligence produced.... In this approach, the picture of the target is shared among all the participants therefore information can easily be shared regarding the target (Clark, 2010).... This essay "What Motivates Serial Killers" examines the criminals that had committed the murder of more than three people over a period of one month or less on separate events....
owever, as signaled by Innes and Sheptycki (2004), increased use of intelligence appears to drift or disrupt the objective of law enforcement interventions.... Also, the ways in which the evolution of intelligence in law enforcement over the last 100 years has influenced the meanings are examined.... This essay "The Difference Between Information, Evidence, and intelligence" outlines that it is concluded that while information makes up intelligence, intelligence is information and while evidence may be considered as information, not all information can be considered to be evidence....
11 Pages(2750 words)Essay
sponsored ads
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"The Target-Centric Approach of Intelligence"
with a personal 20% discount.