StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Law Enforcement and Private Sector Intelligence Organizations - Research Paper Example

Cite this document
Summary
The paper "Law Enforcement and Private Sector Intelligence Organizations" states that a significant difference between homeland security and national security as well as law enforcement is that the former is concerned mainly with noncriminal threats such as public health and public safety…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Law Enforcement and Private Sector Intelligence Organizations
Read Text Preview

Extract of sample "Law Enforcement and Private Sector Intelligence Organizations"

?Intelligence Processes Used by National Security, Military, Homeland Security, Law Enforcement and Private Sector Intelligence Organizations Collection of intelligence is a crucial element in the execution of the tasks of not only the law enforcement agencies but also organizations involved in national security, the military and homeland security as well as private sector intelligence organizations. This provides such outfits access to information about criminal activities or infiltration and other such vital aspects so as to enable them to respond to the given situations appropriately and adequately. All these entities are engaged in the vital task of internal as well as external security, which are of crucial significance to the country in ensuring the safety and well being of their citizens. Every organization has its specific role and mode of operation and, therefore, the nature and frequency of intelligence that they may require for the execution of their tasks also vary. Thus, the cycles and processes of intelligence collection among these organizations differ drastically though they may be sharing some similarities. The responsibility of organizations that have the onus of taking care of national security, such as National Security Agency (NSA), Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI), has increased manifold in the recent days due to the ever evolving nature of security threats from “terrorist groups as well as hostile nation states” (Best, 2001, p.1). Thus, these organizations have revamped their intelligence collection machinery to obtain necessary information for the maintenance of internal as well as external security. They mostly rely on highly sophisticated electronic surveillance equipment sometimes using aircrafts for collection of intelligence, such as TechELINT to “collect, analyze and sometimes and locate” electronic signals from the foreign targets (Bernard, 2009, p.11). On the other hand, law enforcement and homeland security mostly deploy conventional methods for collecting intelligence, mostly using human intelligence sources or less sophisticated electronic devices including human intelligence sources, security cameras and other surveillance equipment. In the present day, the US authorities are rather resorting to a system where all the intelligence disciplines are combined under one window to be utilized by different organizations involved in law enforcement. This is intended to fetch better flow of information among the organizations and will also reduce the consumption of resources apart from ensuring that most reliable information is made available to organizations. Intelligence cycle is the process by which information is disseminated for drawing conclusions about particular evidences in a crime. The main difference between law enforcement intelligence and homeland intelligence is that while the former focuses on criminal aspects, the latter also deals with “noncriminal domestic threats” including issues of public health and public safety (Carter, 2009, p.14). On the other hand, the concept of national security intelligence covers “policy intelligence” and “military intelligence” including identification and observation of hostile elements, weaponry, capabilities of warfare, battle order etc (p.15). Accordingly, the processes and cycles of national security intelligence, law enforcement intelligence and homeland security differ. However, the intelligence collected by all the agencies are similar in the context that such intelligence collection is done for ensuring the safety and welfare of citizens. The main focus of homeland security intelligence is Fire Service Intelligence Enterprise (FSIE) and Public Health/Medical Intelligence, which are two of the initiatives that are “moving forward with greater rapidity” after the 9/11 tragedy (p.19). The main difference in the process and cycle of information among various agencies stems from the roles and responsibilities these organizations have in terms of security. National Security dealt with terrorism and war and, therefore, their intelligence process and cycle vastly differ from that of law enforcement or the homeland security perspectives. Thus, national security intelligence has to cover a wider area of intelligence collection and they deploy appropriate technology including aerial surveillance using unmanned aircraft systems and other sophisticated devices, apart from human intelligence using covert operatives. On the other hand, law enforcement has to deal with prevention of crimes and they collect and analyze intelligence using a mix of surveillance technology, informants etc. In the case of homeland security, their main responsibility is handling noncriminal threats to the public and they use appropriate intelligence processes and cycles. Private organizations usually engage in intelligence collection obtain information for the purpose of individuals or other organizations. The process by which and the cycle of collection of their intelligence will depend on the purpose they are gathering the information. Their sources are limited and also they will have to exercise caution to ensure that any surveillance being done by their agents do not endanger the privacy of other individuals or organizations. In the context of the scope of local or national security, private security agencies do have a role by sharing any information to local law enforcement or federal agencies, which might be of interest to them in the wider specter of national security. Since private agencies are devoid of any statutory powers to enforce surveillance or other intelligence collection methods, the information they can collect or share will also be limited. Similarly, while national security intelligence encompasses the provision of statutory authority to national security agencies to collect intelligence to “conduct foreign relations and protection of national security” the homeland security, on the other hand, does not imply any “formal power” (Randol, 2009, p.16). In so far as it relates to intelligence collection by various law enforcements, the primary objective behind this exercise is to “save lives, protect property, and preempt crime” (Gerringer & Bart, 2012, p.1). Once information is collected, an analyst interprets the data and “disseminates it to authorized consumers” for taking action (p.1). Based on the data analyzed, the law enforcement officers can take further initiatives as the situation warrants. A similar pattern can be found in the case of national security intelligence also where the data is processed by analysts and experts, who interpret its implication and draw appropriate conclusions for enabling the policy makers to issue further instructions for action to be taken. In this context it becomes relevant that irrespective of the purposes, for which data is collected, the process involved in its assimilation, interpretation and drawing of conclusions is more or less the same. Research evidence suggests that private sector organizations own “85% of the US critical infrastructure” and this makes this sector a significant player in the intelligence field as they can significantly add to the extra “eyes and ears” and observe any threat (Carter, 2007, p.7). Thus, the authorities have envisaged the formation of a “fusion center” for establishing a system of information sharing with the private sector (p.7). However, a constraint is felt here that it may not be feasible or appropriate to share with each other some of the information that both government and private sector agencies possess. Despite this limitation, it still can benefit both parties in terms of the possibility to develop “case intelligence” relating to “specific threats, targets and suspects” (p.9). The main advantage of such a fusion can be seen from the fact that it will help different stakeholders to overcome their limitations deriving from their specific roles and powers within the legal framework of the country. For example, organizations in the private sector as well as homeland security will be able to obtain vital and relevant information from the fusion center, as facilitated by national security or federal agencies, which may otherwise be not accessible to them due to their limited powers for collecting intelligence. A problem with such a system is that the rights of private individuals may be compromised by sharing information among private parties and government agencies. Therefore, while imparting information the authorities will have to exercise discretion and care. From the evidences examined during the process of this study, it has come to the fore that the national security agencies, federal agencies and law enforcement agencies have different roles when compared to homeland securities and the entities in the private sector. Similarly, depending on their roles and responsibilities all these organizations have different methods of collecting, processing and cycling data for the purpose of identifying threats and dealing with them. While national security agencies deploy highly sophisticated technologies like unmanned aircrafts for aerial surveillance for the purpose of intelligence collection, other agencies use less sophisticated equipment for the collection of information and its analysis. Similarly, there also exist considerable differences in the statutory powers vested with these organizations, at par with their roles and responsibilities. Another significant difference between homeland security and national security as well as law enforcement is that the former concerns mainly with noncriminal threats such as public health and public safety. However, despite the differences, the process of analyzing, assimilating and interpreting data is more or less same in all organizations. In order to properly align the collection of information and assimilating useful intelligence from the data so collected, the authorities have devised a fusion center, which will be advantageous to all the stakeholders in facilitating relevant and reliable intelligence. Reference List Bernard, R. L. (2009). Electronic Intelligence (ELINT) at NASA. National Security Agency. Retrieved from Best, R. A. (2001). The National Security Agency: Issues for Congress. Congressional Research Service. Retrieved from Carter, D. L. (2007). The Intelligence Fusion Process for State, Local and Tribal Law Enforcement. Intelligence Program, Michigan State University. Retrieved from Carter, D. L. (2009). Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies. US Department of Justice, Office of Community Oriented Policing Services. Retrieved from Randol, M. A. (2009). Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches. Congressional Research Service. Retrieved from Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Compare and contrast intelligence processes Research Paper”, n.d.)
Retrieved from https://studentshare.org/law/1472934-compare-and-contrast-intelligence-processes
(Compare and Contrast Intelligence Processes Research Paper)
https://studentshare.org/law/1472934-compare-and-contrast-intelligence-processes.
“Compare and Contrast Intelligence Processes Research Paper”, n.d. https://studentshare.org/law/1472934-compare-and-contrast-intelligence-processes.
  • Cited: 0 times

CHECK THESE SAMPLES OF Law Enforcement and Private Sector Intelligence Organizations

The Nature of Private Armed Security Guards to Terrorism within the State of Ohio

In other words, no matter what the ideology attached, it is illegal to help organizations that use terrorism as an act of social change.... The paper "The Nature of private Armed Security Guards to Terrorism within the State of Ohio" tells about the nature of private armed security guards to terrorism within the state of Ohio and changes that are proposed to increase the ability of the guards to address any act towards terrorism.... The culture of law and security enforcement has some similarities and some striking differences....
46 Pages (11500 words) Dissertation

The impact of stressful employment in the public sector

For instance, the workforce in different healthcare and law enforcement departments in a public sector frequently have to experience an increased level of their stress while performing their pre-allocated job roles and responsibilities, given the influences of continuous innovation and instability in the business environment (Obiora & Iwuoha, 2013).... in this regard have clearly stated that stress can be formed in a number of ways derived from both internal and external sources in a public sector organisation....
20 Pages (5000 words) Literature review

What Are Fusion Centers and How Are These a Part of Homeland Security

After receiving information from various sources, that is; the public, law enforcement agencies, and the private sector agencies; the information is then analyzed and afterward turned into applicable knowledge.... This goal can only be achieved successfully when the local law enforcement agencies work together with the federal intelligent agencies by sharing any threat information.... The centers are made up of representatives from local law enforcement, state and federal agencies....
7 Pages (1750 words) Research Paper

Securing America and Private Sector Role In National Security

The term paper "Securing America and private sector Role In National Security" states that since the terrorist attack of September 11, 2001, the law enforcement and the law enforcement agencies have been increased tremendously compared to the traditional crime response and prevention mechanisms.... For instance, through community policing, private law enforcement agencies have collaborated with other private security agencies but with homeland security.... Private security and law enforcement are different entities but with similar goals....
7 Pages (1750 words) Term Paper

Roles in homeland security

The term homeland security is an umbrella phrase used by Americans to refer to the coordinated effort by the entire nation so as to have a homeland that is secure, safe, and one that can withstand terrorism and other dangers so as the Americans aspirations and interests, and the.... ... ... way they live can develop well through the efforts of the nation to hinder terrorist attacks within the US, minimize the vulnerability to terrorism, and reduce the damage that results from the attacks that do happen (Bullock, et al 2012)....
5 Pages (1250 words) Essay

Relationship Between Public and Private Security Departments

The paper "Relationship Between Public and private Security Departments" focuses on the critical analysis of the major issues concerning the relationship between public and private security departments.... There is certainly a distinction between public and private security agencies and firms.... Unfortunately, this mutual spirit of cooperation is often lacking between public and private security agencies, causing a breakdown in communication that can serve to threaten the very safety of the individuals that the groups are designed to protect and defend....
12 Pages (3000 words) Research Paper

First Responders: Are We Ready for Another Attack

In the aftermath of this event, cultural belief systems within the public and private security offices began to change in order to support increased training for officers in both domains in order to provide higher levels of support should another attack take place and in order to identify and prevent attacks from taking place.... Privatized security firms provide forces for banks, industries, and personal service where the burden on public law enforcement does not provide adequate coverage in order to focus the security on a specific, private target....
45 Pages (11250 words)

Management and Technology within a Law Enforcement Agency

The paper "Management and Technology within a law enforcement Agency" presents a knowledge management system that allows law enforcement agents to put in the data about the location of an incident, its date and time, victims, lead investigator, and the commencement of the investigation remotely.... The level of knowledge management and technology in a law enforcement agency is internal knowledge management.... Contemporary law enforcement agencies employ nearly all of these solutions and strategies in their knowledge management models....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us