preview

Essay on Intelligence Sharing: Intelligence and Law Enforcement

Better Essays

Intelligence versus Law Enforcement
Intelligence collection and apprehension of criminals have occurred for many years; however, with the exception of the Federal Bureau of Investigation, these actions were performed by different organizations. Nonetheless, roles and responsibilities have changed since the attacks on September 11, 2001. Intelligence-led policing and the National Criminal Intelligence Sharing program were incorporated, and fusion centers were established to help gather intelligence from different levels of the government. Although law enforcement at the local, state, and tribal levels aid in intelligence collection, it is important to ensure that intelligence gathered to protect national security and law enforcement …show more content…

Data can be collected through human sources, satellites, wiretapping, signals, and internet traffic. However, intelligence organizations must be in compliance with the law to ensure that they are not illegally collecting information (Chesney, 2012). Collection occurs because a threat is likely to occur or agencies are trying to find out what information our foreign adversaries possess about the nation’s assets. Intelligence collection occurs in both domestic and foreign territories. Intelligence agencies collect information about foreign adversaries in order to exploit their weaknesses or vulnerabilities (Gentry, 2008). Furthermore, government agencies and political leaders want to discover which of the nation’s assets are seen as vulnerable to the enemy (Gentry, 2008).
Other intelligence operations also consist of covert, counterintelligence operations. Counterintelligence is usually used to collect information about the adversary and weaken foreign intelligence operations. Sabotage, spying, and infiltration are all characteristics of foreign intelligence operations. Covert operations hide the identity of the agent(s) or officer(s) executing the operations. If operations are compromised, this protects the agent(s) against retaliation from the enemy.
The purpose of analysis is to evaluate the collected information and determine

Get Access