Friday, April 12, 2019

Intelligence gathering Essay Example for Free

Intelligence gathering EssayThe primary documental of intelligence gathering is to deal with future danger, non to punish past crimes. This rings especi eithery confessedly in the world of terrorism. Although you be non seeking to punish past crimes, you cannot discount their profitableness when attempting to conceive the future. Information is endless in terms of quantity. There are no limitations to the resources that can create useful and viable breeding. Perhaps the best source of information is that which comes from human sources. However, in legality enforcement the use of hole-and-corner(prenominal) officers and informants is limited. The costs and risks associated with such operations are exponential. Also, many of the terrorist groups and organized hate groups are closed societies and are difficult to infiltrate. To invade Iraq without preparing to deploy immediately and instruct properly the forces necessary to establish order, protect the inhabitants prospe rous cultural legacy, and safeguard the material infrastructure of government and the health system is hardly to evince headache for real people as distinguished from abstr portrayal ideas. (Thomas 2003 4).Nor is determination not to tally at least(prenominal) the civilian Iraqi dead and maimed, the collateral damage, as it were, of liberation. Nor is leaving Afghanistan in shambles the better to absorb war of choice and opportunity but hardly necessity in the Middle East, Nor is willed amnesia well-nigh the fate of the Central American countries where, in the name of democracy during the Reagan years, neo-conservatives championed war rather than fostering compromise and leveraging the social change that might have given substance to democratic forms.But all of these acts and omissions are entirely consistent with cynical power-sharing compromise with the hard proponents of an unadorned chauvinism. And they are consistent as well with sentiment that administration realists a nd neo-conservatives appear to possess jointly, which is indifference to what liberal humanitarians deem essential presageable regard for the opinion of our old democratic allies and due concern for the lives of the peoples we propose to democratize. (Thomas 2004 11).Therefore, much of the information gathered comes from traditional sources such as reports, search warrants, anonymous tips, public domain, and records management systems. This information is utilize to populate various investigative databases. When investigating crime or developing answers to ongoing patterns, series, or trends, law enforcement personnel often rely upon numerous databases and records management systems. One predictable as yet little remarked significance of the outrages committed in America on 9/11 has been an upsurge of academic interest in the study of terrorism.The number of US institutes and investigate centers and think thanks which have now added this subject to their research agendas or, in some cases, have been newly established to specialize in this field has mushroomed. In Britain and otherwise European countries the increase in interest has been more modest some universities are now blood to recruit specialists in terrorism studies to teach the subject as part of the curriculum of political experience or internationalist relations.Yet throughout European academia there is still deep-seated reluctance, if not outright refusal, to recognize that studying terror as weapon, whether by sub-state groups or regimes, is legitimate and necessary donnish activity. Most of the standard British introductory texts on politics and international relations make no reference to the concept of terrorism, or if they do it is only to dismiss it on the grounds that it is simply uncomplimentary term for guerrilla warfare and freedom fighting. Equally remarkable is the neglect of the use of terror by regimes and their security forces.The omission of reference to these phen omena in the introductory texts is all the more startling in gull of the fact that throughout history regimes have been responsible for campaigns of mass terror, of lethality and destructiveness far greater in scurf than those waged by sub-state groups. (Mary 2003 25) It takes little imagination to see that the events of September 11 delivered profound shock to Americas sense of its kind with the outside world. Commentators inside and outside the United States strove to find words to express their sense of the enormity of the attacks.The attacks were wake-up call for Americans. They constituted the end of American innocence, final blow to Americas privileged position of detachment from the messy and blood-red conflicts that blighted less favored countries. America had now once and for all entered the real world of international politics, its illusion of invulnerability finally shattered. An important assumption behind these reactions was that Americas stance toward the outs ide world could and must change as result of these events.American isolationism (in so far as it still existed), its tendency to act unilaterally, indeed its famed exceptionalism itself must inevitably give way to an acknowledgment that the United States was just corresponding any other power. What precise policy implications might flow from such recognition was as yet unclear it was enough that the events of September 11 constituted turning point in American unknown relations. The world, it was said repeatedly, would never be the same again, and neither would America. Simulation exercises of terrorist situations which have occurred can be highly useful.Lessons can be learnt. Response patterns and negotiating positions have to be viewed in the broader context of government policy-making. Problems shown up by simulation can be examined with view to solution are policy-makers prepared for potential crisis or not? Communications breakdown, working at cross purposes and the impa ct of critical disorganization are regular difficulties. Terrorist tactics and strategies change and this can strain the capabilities of the authorities to respond effectively. (John 2004 33-36).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.