ISIL Intelligence Collection
TheUnited States Intelligence Community has been at the forefront ingenerating efforts to counter the Islamic State of Iraq and theLevant`s Branch in Libya (ISIL-Libya) through IntelligenceCollection. The ISIL-Libya is a militant Islamist group operating inLibya, and it has conducted a series of attacks in the country andother parts of the world. Over time, the US Intelligence Communityhas developed various strategies for collecting and analyzingintelligence on this Islamist terror group. Also, it has beendeveloping plans and activities in the U.S to prepare tocounter-attack the terror attacks carried out by this group to enablethe security officials and law enforcement to disrupt or prevent theattacks from occurring or being executed. The US IntelligenceCommunity has made significant investments in advanced systems ofintelligence collection to improve analytical methods, resources, andprocess that facilitate making effective and accurate analyticalintelligence judgments. The aim of investing heavily in the improvedintelligence collection systems is to enhance the adequateavailability of information, which is crucial in making accurateintelligence judgments in projecting the terror attack plans andactions (Richelson,2015).
Thispaper seeks to discuss ways that the U.S. can use in intelligencecollection on ISIL-Libya Islamist group.
Waysthat the ISIL-Libya Terrorist Group Can Determine How the U.S Can DoIntelligence Collection on Them
TheU.S Intelligence Community carries out intelligence collection onvarious terrorist groups through various ways. Some of the methods ofintelligence collection have been implanted by the U.S IntelligenceCommunity since historical times and thus are common and could bepredicted by the terrorist group on how the U.S can conductintelligence collection on them. Therefore, when thinking like aterrorist, it can be determined that the U.S will carry outIntelligence Collection of them through a program known as "metadata"that involves the recording of calls made to America. Through thisprogram, the U.S Intelligence Community can obtain relevantinformation that could help in knowing the plan of the terroristgroup or tracing the person who made the call (Malone& Bernstein, 2015).
Inaddition, it can be determined that the U.S Intelligence Communitycan conduct intelligence collection on them through working withdifferent technology companies including Yahoo, Facebook and Googleto investigate instant messages, posts on Facebook and emails for anysuspicious posts or information that could be useful (Malone& Bernstein, 2015). Moreover,it can be predicted that the U.S will conduct intelligence throughintercepting internet communication and activities. They monitor andcheck to determine the activities that the users are carrying out onthe internet. They check the websites, social media posts, and emailsamong others to find any information that could be valuable inhelping their analytic and countering process (Malone& Bernstein, 2015).
Furthermore,the terror group can determine that the U.S will carry outintelligence collection on them through surveillance that involveswatching a specific person who seems suspicious or acting insuspicious ways. They can record the conversations of targetedindividuals including both Americans and Non-Americans (Malone& Bernstein, 2015).
DataCollection Programs That Would Be Best Utilized On ISIL-Libya
Theterrorist in the contemporary society has a real plan that hasgenerated them with victory in the past. They are executing theirplans to perfection and thus to counter these terrorist activities,it is important for the intelligence community to the device andimplement counterterrorism strategies that are more effective.Various data collection programs have been developed to counterterrorism activities including situational logic, applying theory andcomparisons with historical events. The three data collectionprograms mentioned above are best that could be utilized oncountering the ISIL-Libya (Heuer, 1999).
Situationallogic is the most commonly used program for data collection by theintelligence community. In this program, the analyses begin withtaking into consideration the actual components of the currentsituation and avoid broad generalization of numerous cases that aresimilar. It seeks to understand the situation in its own distinctlogic and identify the logical origin or effect of the situation. Itfocuses on determining the cause-effect relationships that allowintelligent analysis to achieve their goals. Therefore, this programwill enable the intelligence community to determine the origins andcauses of the ISIL-Libya attacks and work with the data to determinethe future outcome of this terror group. The intelligence communitywill also be able to recognize the goals that are pursued by theterror group and thus develop and implement effectivecounterterrorism strategies to stop or interrupt the terroractivities of the ISIL-Libya (Heuer, 1999).
Applyingtheory is also a data collection program that would be used best inISIL-Libya intelligence collection. It can play a significant role inISIL-Libya intelligent collection because it helps in identifying themajor components of the terror group. Also, it allows them to obtainsignificant details that could be useful in helping to prevent ordisrupt the terror activities of the ISIL-Libya. The application ofthe theoretical proposition will enable the intelligence community toproject the outcome of the terror plans and thus work towardsstopping it (Heuer, 1999).
Comparisonwith a Historical situation is another data collection program thatcould be best utilized in ISIL-Libya. In this program, theintelligence community will be able to conduct investigations onISIL-Libya by comparing the current trends of terror activities withthe historical precedents with similar events that occurred in thesame country or other nations. Therefore, the comparisons allow theintelligence collection on ISIL-Libya by enhancing the understandingof intelligence community of historical events and use thatinformation to fill the gaps of the current trends of the terrorgroup. It makes the intelligence community understand that the sameforces that facilitated the occurrence of terror groups and executinga series of attacks in the past could be similar to those of theISIL-Libya terror group that is occurring currently. Also, it enablesthe intelligence community to determine the effective interventionmethod or policy to be implemented to prevent the same outcome thatoccurred in the past (Heuer, 1999).
TheMembers of the Intelligence Community (IC) That Would Be the BestCollectors of Intelligence on ISIL-LIBYA
Themembers of the intelligence community play a significant role inproviding intelligence support to national security,counterespionage, military support and foreign defense policy. Themembers of the intelligence community that would be the bestcollectors of intelligence on ISIL-Libya include the law enforcementofficers and the homeland security intelligence officers (Oleson,2016). The homeland security intelligence community was establishedafter the 9/11 attacks to advance its counterterrorism strategies inorder to effectively combat the current sophisticated methodsemployed by the terror groups. Therefore, the members of the homelandintelligence security will be the best in intelligence collection onISIL-Libya because they have developed advanced interventionstrategies to combat the terror group effectively. Also, they haveestablished intelligence fusion centers in different states that areable to collect information throughout the U.S regarding theactivities of the ISIL-Libya. They also share and exchange thecollected information with other relevant authorities bothdomestically and internationally especially with the Libyanintelligence communities, therefore, they contribute towardsprevention of a terrorist incident from taking place (Oleson, 2016).
Similarly,the law enforcement officers are the members of the intelligencecommunity that are the best collectors of intelligence of theISIL-Libya. The law enforcement officers are the best collectors ofintelligence on ISIL-Libya because they uphold sizable components ofinformation that contributes towards generating significantinformation that is useful in helping prevention or disrupting ofplanned terror activities. They also work closely with the lawenforcement officers in Libya to obtain firsthand information aboutthe activities and plans of the ISIL-Libya (Oleson, 2016).
TheMost Effective Intelligence Analysis Strategies for Combating theISIL-Libya
Themost effective intelligence analysis strategies for combating theISIL-Libya include the human intelligence (HUMINT) and the SignalIntelligence (SIGINT). Human intelligence is the best intelligenceanalysis strategy because it comprises of a broad range of skillsincluding deceit, manipulation, and traditional diplomaticintelligence. It includes the use of a spy who can pretend to be arepresentative of a country (Libya) and collect the requiredinformation on ISIL-Libya and use the information to either preventor disrupt the terror attacks or activities planned by the gang. Theamount of information generated by a spy is usually overwhelming,which can be used in multiple efforts by the intelligence communityand policymakers. Despite the increasing advances in technology, thehuman component has remained effective and crucial in providingintelligence information (Oleson, 2016).
Also,intelligence signaling (SIGINT) is the most effective intelligenceanalysis strategy because it provides distinct opportunities forintelligence gathering. The information is collected throughintercepting the telegraph and messages signals. The calls made on acell phone can be tapped and traced, as well the communicationsposted on a blog or text message can be listened to and thus providecrucial information for intelligence efforts. Therefore, thisstrategy can allow the U.S intelligence community to collectinformation on ISIL-Libya through an electromagnetic spectrum. Thesecrets of the group can be intercepted through coding and decodingof the messages that have been kept secret by the terrororganization. These secrets can be used to prevent or disrupt theterror activities of the ISIL-Libya (Oleson, 2016).
Theseries of terror activities carried out by the ISIL-Libya hasprompted the US Intelligence Community to advance itscounterintelligence strategies to combat this terror organizationeffectively. The intelligence community has made heavy investments indeveloping and implementing advanced intelligence collection systems.The aim of this is to facilitate the acquisition of adequateinformation about the ISIL-Libya group so that the intelligent teamcan be aware of their plans and help the security team to makeaccurate intelligence judgments. The members of the IntelligenceCommunity (IC) including Homeland Security Intelligence and the lawenforcement officers would be the best collectors of intelligence onISIL-LIBYA. The most effective intelligence analysis strategies forcombating the ISIL-Libya include the human intelligence (HUMINT) andthe Signal Intelligence (SIGINT). Therefore, having adequateinformation concerning the ISIL-Libya is crucial in the intelligenceprocess and combating of the terror group activities.
Heuer,R. (1999). Chapter 8, Analysis of Competing Hypotheses. Psychology ofintelligence analysis. Washington, DC: US Government Printing Office.Retrieved March 29, 2017, fromhttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf
Heuer,R. (1999). Chapter 14, Improving Intelligence Analysis. Psychology ofintelligence analysis. Washington, DC: US Government Printing Office.Retrieved March 29, 2017, fromhttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf
Malone,T. W., & Bernstein, M. S. (2015). Handbookof collective intelligence.MIT Press.
Oleson,P.C. (2016). AFIOâ™s Guide to the Study of Intelligence.Retrieved March 29, 2017, fromhttp://www.afio.com/publications/AFIO`s_Intelligence_Study_Guide_ver1_for_public_release_2017Jan01.pdf
Richelson,J. T. (2015). TheUS intelligence community.Westview Press.
No related posts.