StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Sharing of Intelligence with Coalition Issue - Essay Example

Cite this document
Summary
"Sharing of Intelligence with Coalition Issue" paper discusses the advantages, disadvantages, and recommendations for sharing intelligence information with the Somali anti-piracy and anti-terrorism coalition. The paper compares the coordinating establishments accountable for national security. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Sharing of Intelligence with Coalition Issue
Read Text Preview

Extract of sample "Sharing of Intelligence with Coalition Issue"

Managing Intelligence Sharing of Intelligence with Coalition Issue Paper In response to the Somali pirates who have aligned themselves with a faction of al-Shabab, an al-Qaida affiliated group fighting for control of Somalia and carrying out terrorist attacks in neighbouring countries and against the ineffective African Union peacekeepers in the capital of Mogadishu. The U.S. government has been asked by counter-terrorism and anti-piracy coalition fighting the pirates and terrorist to provide all the indications and warning and other intelligence that it can to the coalition. Thus, the Secretaries of State and Defence of the United State have put in place a new intelligence cooperation structure for safeguarding the security of the American homeland, creating the limits on the intelligence to be shared. This issue paper discusses the advantages, disadvantages as well as the recommendations involved in sharing intelligence information with the Somali anti-piracy and anti-terrorism coalition. The paper compares the current coordinating establishments accountable for national security, economics, intelligence, and drug control. It then grants the streamlining recommendations for the Secretaries of State and Defense, which recognizes the necessity to assimilate foreign and domestic counterterrorism activities, although there is disagreement whether to depend on the existing National Security Council organization or construct a new organizing process, and on the need for uniting some of the effective homeland security interventions and offices. Advantages and reasons for Intelligence Sharing The Secretaries of State and Defence Department facilitates the sharing of an extensive range of piracy and terrorism intelligence. Moreover, there is sharing of related intelligence among several users in the National counterterrorism public via its production of inclusive, nationally coordinated, investigative products and the safe website. These provide the coalition against piracy and terrorism with relevant information to capture the criminals (Tuzuner, 2010). Global authorized agencies like the coalition against piracy and terrorism that comprises Kenya, and other nations can request the intelligence information from the Secretaries of State and Defence Department to assist in the coalition’s undertakings. This should be consistent with applicable rules and guidelines controlling access to intelligent information as stipulated in the Department for State and Defence requirements. The counter-piracy mission necessitates sharing several types of piracy-related information with the Secretaries of State and Defence Department, for example, the exchange of biometric and biographic information associated with identified or alleged pirates and terrorists. Sharing of such information often contains confidential information and delicate, discreet, law execution, and state and defence security information concerning piracy and terrorism. It also incorporates other data that, in the course of time, can assist disclose links to piracy and terrorist groups the individual pirates or terrorist (Tuzuner, 2010). Evidence concerning misplaced or stolen identifications and suspicious financial dealings, for example, could produce data on the piracy groups or individuals who consequently related to the specific piracy and terrorist risks. The terrorist groups have also extended to criminal activities such as sea piracy and drug trafficking to fund their terrorism activities across the world. With the heavy machinery and information needed in the fight against sea piracy and terrorism, the Secretaries of State and Defence is aware that, no state can alone win the battle against sea piracy and terrorism that has become a global threat. It is, therefore, significant for the Secretaries of State and Defence to facilitate international co-operation amongst national authorities, through provision of intelligence information support (Walsh, 2010). The Secretaries of State and Defence have acknowledged that gathering of intelligence information within the United States boundaries is evidently an important constituent of the national governments determinations in the war against sea piracy and terrorism. The Secretaries of State and Defence Department also appreciates the initial process in distracting piracy and terrorism plots and averting terrorist outbreaks. Finding the intelligent information about the manoeuvres of pirates and terrorist coalitions as well as the undertakings of specific pirates and terrorists, both within and outside the nations boundaries is crucial. This, therefore, provides solid reason to share the intelligence with the counterterrorism coalition in Somalia (Walsh, 2010). The collection of intelligence information by the Secretaries of State and Defence Department, however, forms the initial stage in fighting terrorism and piracy across the Indian Ocean. The intelligent information that would be provided acts like a piece of a puzzle. It is integrated with other pieces of information to provide a comprehensive report about the whereabouts of the pirates and terrorism, their piracy and terrorism plans. Moreover, it helps in identifying financiers and those providing weapons for the pirates and terrorists. The central purpose of the Secretaries of State and Defence is to provide intelligence service necessary in safeguarding the safety and security of the United States citizens and other vulnerable people in different parts of the world. Detectives are by nature nonbelievers and doubters. The State and Defence Department acquires intelligent information through great expense and occasionally at a pronounced risk. Sharing such information does not come obviously, although it is very vital in the fight against global piracy and terrorism by anti-piracy and anti-terrorism coalitions. Sharing intelligence necessitates a readiness to disclose one’s faults, since it involves telling the coalitions the information they have concerning the pirates and their activities (Walsh, 2010). Furthermore, the Secretaries of State and Defence acknowledge that, having intelligent information without taking the necessary step to combat the pirates and terrorists cannot help stop terrorism and piracy. However, the intelligent information is a cause for action. This is the reason it is important for the Secretaries of State and Defence to not only have the collected intelligent information on terrorist and piracy. Nevertheless, it is also critical to share the intelligent information with other machineries of the national government. Moreover, it is also crucial to share with other coalitions against piracy and terrorism that possess parallel evidence and hints to defensive action that safeguards lives (Walsh, 2010). In the past, the Secretaries of State and Defence has had international cooperation in intelligence sharing. This is especially between the United States of America and Britain, for example; the two nations have had routine intelligence exchanges since the late 1930s. This has been happening between the intelligence services of the two nations because they recognise it to be within their interest to do so. Such cooperation is never an end unto them. Detectives have identified that no single country has the monopoly on intelligence. It is thus important for the Secretaries of State and Defence to share the intelligent information with the coalition against piracy and terrorism in the Indian Ocean to help fight the vice (Walsh, 2010). Global collaboration is and will continue to be a vital component of the intelligence element of the campaign against piracy and terrorism. The global cooperation on counterterrorism and piracy did not begin after the frequent piracy activities in the Indian Ocean coast. Several successful operations against al-Qaida before piracy by Al-Shaabab militant were the consequence of combined initiatives comprising United States and other foreign intelligence services. The operation were successful since there was sharing of intelligence thus it would be important for the United States to provide intelligence to the coalition against piracy and terrorism (Walsh, 2010). The Secretaries of State and Defence also anticipate that the coalition against piracy and terrorism in Somalia would also offer the United States insights. Insight will be on dire regions that the United States’ intelligence agencies has neglected yet need a lot of attention. For example, some African and European intelligence services have carefully looked at the problem of pirate’s as a process that is significant to comprehend. This is if the United States Secretaries of State and Defence needs to move past seizing and murdering high-value targets. Interestingly, the Secretaries of State and Defence Department has only just started to deal with the problem of pirate recruitment (Walsh, 2010). The intelligence information provided by Secretaries of State and Defence would provide support efforts. This will help to sense and avert piracy and terrorist attacks by keeping situational cognizance of the dangers, warnings, and cautions, and develop vital infrastructural protection strategies. This is to certify the safety and elasticity of infrastructural operations such as transportation, electric power, and telecommunications in a State, region, or locality. It will also help to improve training, responsiveness, and implementation programmes. Hence, it will be easy to certify that State, tribal and local, employees are prepared to pact with pirates strategies, capabilities, tactics, and intentions (Walsh, 2010). Given the multinational features of the jihadi nebula, all countries are at risk, at least hypothetically (Rosenau, n.d.). The boundary-less risk has demonstrated to be tremendously operationally adaptive. It has been proved by the capability of the network’s independent cells to undertake key post-9/11 attacks in Madrid, London, Istanbul, Casablanca, and other major cities in the world. However, averting future attacks, disassembling support structures, and distracting the terrorist employment procedure necessitate an intelligence-driven approach. It should be coupled with intelligence sharing among the coalition against piracy and terrorism would be the best approach by the Secretaries of State and Defence Department (Walsh, 2010). Disadvantages and Issues Affecting Intelligence Sharing Secretaries of State and Defence acknowledges that intelligence cooperation contacts with foreign services and coalitions have disadvantages as well. The Secretaries of State and Defence must endure watchful for signs of conflicting interests. The coalition against piracy terrorism and can offer the U.S enemies with vital delicate information about U.S. strategies, interest and plans (Tuzuner, 2010). The extensive internet use and access and other contemporary communications technology techniques have equipped the pirates with the necessary tools and information to exploit the sea transport. However, several Americans still view closer collaboration of law enforcement and intelligence sharing efforts as unsuitable and even risky to civil freedoms. The Secretaries of State and Defence would like to assure the public that much care is being taken to ensure that the intelligence get to safe hands (Walsh, 2010). Continuing wars over legal, political, and human rights problems, if permitted to develop, could also challenge the conducts of intelligence cooperation in fighting piracy and terrorism. The coalition privacy laws, which are more comprehensive than everything in the United States, could restrict the capability of Coalition organisations to share information regarding individuals. Equally, there are uncertainties that intelligence could convert to be part of an illegal trial. Hence, this could make the United State intelligence services more unwilling to risk negotiating their foundations and methods by sharing intelligence with the coalition organisations against piracy and terrorism (Tuzuner, 2010). Foreign Intelligence cooperation can also be inspired to abuse the U.S.s important abilities to advance their welfares. The Secretaries of State and Defence should contemplate the suitable kind of relationship that best serves each countrys necessities. For example, while some intelligence sharing could be based on temporary, specific needs, others could incorporate larger longstanding strategies. Intelligent liaison relations between intelligence services can occasionally permit for warmer relations between the U.S. and potentially antagonistic foreign entities (Tuzuner, 2010). The liaison coalition could attempt to advance understanding into the U.S. sources, purposes, and methods through explicit or secret means. There can also be poor information gathering, where the coalition against piracy and terrorism could use employ less laborious intelligence collection methods than the U.S., thus helping Intelligence Community analysts to validate definite information autonomously. The members of foreign intelligence services could be convoluted in immoral and unlawful activities, or use prohibited approaches to acquire intelligence (Tuzuner, 2010). This unwillingness to share intelligent information is not limited to dealing with foreign services and foreign anti- terrorist coalitions. In the United States of America, the huge intelligence civic has often found it hard it to share intelligent information. This has in the past had disastrous significances. For example, it is confirmed by the pre-9/11 incidence where the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) failed to share important information regarding the 9/11 hijackers. It is, therefore, important for the united States to provide the intelligent information regarding the pirates and the terrorists (Walsh, 2010). The United States of America would benefit from international cooperation and liaison partnerships in sharing intelligent information because they provide Access: the cooperation would have access to information on the areas repudiated to direct U.S. penetration. Recommendation As the coalition against piracy and terrorism continue to enter into new information-sharing dealings with foreign entities, participants of the coalition should endure to assess, the motivations of cooperation partners. The foreign intelligence services are primarily apprehensive with their egocentricity. So, the Intelligence Community and the U.S. policymakers should be aware that the foreign coalitions could have hidden motives in giving intelligence to American officials (Tuzuner, 2010). The Secretaries of State and Defence’s intelligence sharing across the Atlantic is expected to continue during period of the global crusade against al-Qaida, piracy groups and the wider jihadi nebula. Intelligence sharing can serves collection and operational purposes, and can subsidise to wider political objectives. However, continued intelligence cooperation should not be taken for granted. The Secretaries of State and Defence should remain attentive to factors that could corrode the contented behaviours of cooperation between the United States and the coalition against piracy and terrorism in Somalia (Tuzuner, 2010). Secretaries of State and Defence desire to transact with foreign services on a mutual foundation, where cooperation permits for superior control over how and to whom mutual information is distributed. In the case of human intelligence, developing an individual’s autonomous intelligent abilities is time consuming and in the situation of technical intelligence, it is both expensive and time-consuming. Thus, riding along a foreign intelligence service through cooperation connections can assist in overcoming shortages in language abilities and cultural cognizance. Also, it can decrease the dangers related to intelligence collection activities, and impart practices of cooperation that can rally joint operations in combating piracy (Walsh, 2010). The global war on sea piracy and terror advances into the long war. The United States new term of art that is projected to mirror more precisely the prolonged nature of the movement against al-Qaida intelligence. It remains at the forefront of the coalition’s strategy in combating piracy activities along the coast of the Indian Ocean (Walsh, 2010). The Secretaries of State and Defence also functions as the principal and shared knowledge store on identified and alleged pirates, terrorists and global terror coalitions. The secretary certifies that agencies and departments have admission to and obtain all-source intelligence backing necessary to implement their counterterrorism strategies or make alternative, independent, and mission-oriented analysis (Tuzuner, 2010). The Secretaries of State and Defence of America have the main duty in the national government for investigation of all intelligence and information relating to piracy and terrorism. The department would then support the Department of Justice and other relevant agencies in the satisfaction of their duties to publicize piracy and terrorism-related information. To undertake this duty, the Secretaries of State and Defence is operated by employees from several national agencies and departments. Thus, letting the growth of organized and incorporated valuations of piracy and terrorist plans, threats, intentions, and abilities. This make the department an important element to assist in fighting piracy and terrorism by provision of the necessary intelligence (Tuzuner, 2010). Sharing of intelligence also facilitates the speed of action for example cooperation could collect and disseminate important information, thus granting the United States the capability to react to time-sensitive dangers. The cooperation as well may have greater cultural insight about specific issues that the United States may otherwise misunderstand (Tuzuner, 2010). References Rosenau, W. (n.d.). Liaisons Dangereuses? Transatlantic Intelligence Cooperation and the Global War on Terrorism. Retrieved 04 December 2014 from http://www2.warwick.ac.uk/fac/soc/pais/people/aldrich/vigilant/04b.rosenau-liaisons-dangereuses.pdf. Tuzuner, M. (2010). Intelligence cooperation practices in the 21st century: Towards a culture of sharing. Amsterdam: IOS Press. Walsh, J. I. (2010). The international politics of intelligence sharing. New York: Columbia University Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Managing Intelligence Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Managing Intelligence Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/miscellaneous/1669077-managing-intelligence
(Managing Intelligence Essay Example | Topics and Well Written Essays - 2250 Words)
Managing Intelligence Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/miscellaneous/1669077-managing-intelligence.
“Managing Intelligence Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1669077-managing-intelligence.
  • Cited: 0 times

CHECK THESE SAMPLES OF Sharing of Intelligence with Coalition Issue

The Safety and Reliability Issue of Robotic System with Artificial Intelligence

This paper ''The Safety and Reliability issue of Robotic System with Artificial Intelligence'' reviews the safety and reliability issues associated with Robotic System with Artificial Intelligence.... This paper analyses the Safety and Reliability issue of Robotic System with Artificial Intelligence.... SAFETY AND RELIABILITY issue OF ROBOTIC SYSTEM WITH ARTIFICIAL INTELLIGENCE Incredible speed in execution is the major advantage of robots controlled by artificial intelligence....
12 Pages (3000 words) Term Paper

Multiple Intelligences and Its Relationship to Curriculum Development

theories of intelligence can offer a neutral basis between the perspective that there is an exclusive mechanism in which minds function and the idea that every mind is distinct (Armstrong, 2000).... The Multiple intelligence (MI) Theory of Gardner can be viewed as the mechanism that stimulates learners to encourage a positive response from learners, skills, and knowledge related to healthy living and the factor that unites social workers, community advocates, educators, and school administrators to advance health education....
14 Pages (3500 words) Research Paper

The Correlation of Emotional Intelligence to Job Performance

ne of the seven areas of intelligence discussed in multiple intelligence theory, personal intelligence, corresponds to earlier theories such as social intelligence.... The author concludes that emotional intelligence has been found to be a predictor of work performance.... This study has demonstrated the relationship between emotional intelligence and work performance.... Hiring individuals with higher levels of emotional intelligence are associated with financial gain....
7 Pages (1750 words) Literature review

Gender Roles: Sociological Concepts

Crises demand the kinds of strength and intelligence associated with hunting.... The term gender essentially refers to the meanings that social systems ascribe to female and male categories.... All known societies possess such a system, though the components and workings vary widely from society to society....
8 Pages (2000 words) Essay

What impact does emotional intelligence have upon communication in social work organisations

Social workers must listen with the aim of developing a mutual understanding with the client and should be ready to welcome the sharing of information fully with the client.... Emotional intelligence theories first emerged in the beginning of the 19th century with Thorndike (1920) defining emotional intelligence capacity as social intelligence.... He stated that social intelligence is the aptitude to comprehend and control women and men, girls and boys to....
12 Pages (3000 words) Essay

Future Intelligent Led Policing Model

'Intelligent-led policing is a business model and managerial philosophy where the data analysis and crime intelligence are pivotal to an objective, decision-making framework that facilitates in crime and problem reduction.... 'intelligence-led policing is zero tolerance policing but against the right people at the right time for right reasons....
6 Pages (1500 words) Essay

Emotional Intelligence

It is a proved fact that emotional intelligence is necessary when anyone is working in a team or group along with his co-workers.... The emotional intelligence may help us to create social competencies in our personality which definitely helps us to understand other people in a good way.... If we can understand others Emotional intelligence basically means to control our emotions and expressions and thus maintain the interpersonal relationships....
10 Pages (2500 words) Essay

Strengths and Limitations of Multinational Coalitions: The Gulf War

Some of the strengths include the sharing of skills and capabilities that one nation could not have, sharing of supply and maintenance costs and the coalition boosts the unity and morale of the forces involved.... Another factor that can stimulate the multinational coalition to achieve its desired aims is by equitable sharing of responsibilities.... A long term coalition involves the formation of an alliance that is not affected by future changes such as leadership takeover and will always exist as long as cases of uncertainty situations arise....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us