Free Essay

Greatest Threat to U.S. National Security

In:

Submitted By cblack6641
Words 1363
Pages 6
Greatest Threat to U.S. National Security
Cassandra Black
INTL 443
Foreign Intelligence Organizations
Instructor: Robert Bier
July 25, 2014

INTRODUCTION The United States is considered the most powerful country in the world, so naturally, there are many other countries that are always threatening the country’s natural security. In this paper, we are going to look at three countries that have valid resources in intelligence to be a major threat to the United States. China is a huge threat based on the country’s intelligence resources in HUMINT, SIGINT, and cyber capabilities. Iran’s HUMINT and MASINT intelligence collection methods are highly capable of being a number one contender against the United States. Lastly, Russia has a deep history in HUMINT intelligence with successful espionage and ELINT capabilities that no other European country has used before. These three countries are highly skilled and capable to be a major threat to the world. So which country’s intelligence capabilities is the number one threat?
CHINA, IRAN, or RUSSIA? China, Iran and Russia are three countries that are equally capable to be a threat to U.S. national security. As stated above, each country is highly skilled in their respective intelligence collection method. The Chinese Spy Agency is an extremely effective organization that is comprised of twelve different bureaus of intelligence collection. Each bureau collects intelligence from HUMINT, SIGINT, cyber, and so on. China’s HUMINT collection is considered number one in the world, due to the fact that their agents never get caught. Iran’s HUMINT counterpart consists of the Iranian Revolutionary Guard Corps that is not just based in Iran, but also in Syria, Afghanistan, and the United States. These guards are extremely capable in collecting intelligence and transferring it to the intelligence community. Although Russia is capable in HUMINT collection activities, the country’s strength lies in cyber warfare. “Russia, considered the second most adept at cyber warfare after the U.S., could use an attack on American computer systems as a way to seek revenge on the U.S.”With the help from Russia’s Intelligence Agency, SVR, they have a fighting chance to be the United States’ number one threat to national security. China’s intelligence collection methods are recognized as highly capable in the threat to U.S. national security. As mentioned before, China’s Spy Agency has twelve bureaus that are skilled in their respective collection methods. China’s OSINT capabilities are highly capable compared to Iran and Russia. The Chinese use tourists and citizens to travel to other countries, mostly the United States, to collect information that could be of use to the Spy Agency. These “secret” agents are then debriefed as if they knew nothing of the operation. The country’s HUMINT method is filled with five different types of agents ranging from secret to expendable that collect information. Unlike Russia, the Chinese do not use dead drops as a recruitment process, but rather loyal citizens to collect information. China’s MASINT capabilities has “the most active and diverse ballistic missile development program in the world.” Unlike any other country, China’s cyber warfare technique is among the world’s best. The country’s growing fascination with technology and hacking has prompted several hacker groups that have proved to be a huge problem to the United States and other countries in the Middle East. The Comment Group, one of many hacker groups in China, “had successfully stolen information from multiple large, prominent businesses from the U.S. to Europe.” After a review of all of the highly capable intelligence collection platforms for China, I believe that China is the number one threat to the United States’ national security. Iran’s threat to national security is my number two choice in terms of capable collection methods within the intelligence community. Iran is definitely a contender in the threat game against the United States and surrounding countries. Iran is a developing country that has one of the world’s largest ballistic missile program in the world. In fact, it was stated that “with sufficient foreign assistance, Iran could develop and test an ICBM capable of reaching the United States by 2015.” Iran’s HUMINT intelligence service includes more than 30,000 agents that collect intelligence by stealing technology and espionage. These agents are actively engaged in numerous covert operations all over the world. The difference between the Chinese HUMINT agents and Iran’s HUMINT agents is that Iran’s agents use bombing attacks and assassination as part of their collection method, whereas the Chinese do not use violence to collect information. Iran’s cyber collection is rapidly developing to be one of the most active players in the world. “The rapid development of Iran’s cyber warfare capability means that Israel and other western countries must work decisively and systematically to maintain qualitative and operational superiority in cyberspace.” With Iran’s ballistic capabilities, HUMINT covert operations, and cyber warfare development, Iran is a close contender to China as a threat to U.S. national security. Although Russia does not have a lot of intelligence capabilities, they are still a dangerous threat to U.S. national security with the resources they do possess. Russia’s Foreign Intelligence Service, sluzhba vneshney razvedki, or SVR, is Russia’s primary intelligence agency. The SVR is responsible for the country’s espionage and intelligence activities inside and outside of the Russian borders. Russia’s HUMINT agents actively recruit members by finding people in other countries and persuading them to collect information to send to Russia. If the people refuse, then they will possibly be exiled from Russia or possibly by killed. Even with Russia’s brutal recruitment technique, their HUMINT capabilities are dwindling down. “Although the opportunity to collect HUMINT has expanded as a result of the relaxation of security standards in focused on Russia; the reduction in number of SVR intelligence officers, the closing of diplomatic facilities throughout the world, and the loss of access of former Warsaw Pact intelligence services will lead to an overall reduction in intelligence acquired through HUMINT.” With the reduction of HUMINT capabilities, Russia has relied on their SIGINT collection method. The Russian Federation is the only country in Europe that has used their ELINT collection satellite system. “ELINT systems have played a major role in Soviet military doctrine with the dramatic increase of radio and radar emitters on the battlefield during the past 30 years.” Although Russia’s military and collection methods prove capable to be a threat to national security, it is not a higher than China’s threat.
CONCLUSION
After the review of China, Iran, and Russia’s intelligence collection methods, it is safe to say that China is the United States’ number one threat to national security. China is a very large country with a multitude of technologies and resources to potentially bring the United States down a few levels. China’s Spy Agency is a well-organized group that has highly skilled agents and citizens that collect information for the country, all without pay and harsh recruitment techniques. China’s HUMINT, SIGINT, and cyber collection methods are stronger than those of Iran and Russia.
BIBLIOGRAPHY

BAA, NPS. "FY 12 FUNDING OPPORTUNITY FOR THE NATIONAL CONSORTIUM FOR MEASUREMENT AND SIGNATURE INTELLIGENCE(MASINT) RESEARCH PROGRAM." NPS BAA. 2012. http://www.nps.edu/research/documents/baa-12-001.pdf (accessed July 25, 2014).
Kronenfeld, Gabi Siboni and Sami. "Developments in Iranian Cyber Warfare, 2013-2014." INSS Insight . April 3, 2014. http://inss.org.il/index.aspx?id=4538&articleid=6809 (accessed July 24, 2014).
Lawrence, Michael Riley and Dune. "Hackers Linked to China's Army seen from EU to D.C. ." Bloomberg. 2014. http://bloomberg.com (accessed July 2014).
Lindborg, Christina. "Russia & SIGINT intelligence." FAS. 1997. http://fas.org/spp/guide/russia/military/sigint (accessed July 25, 2014).
"MPS BAA Announcement ." n.d.
Pike, John. "Human Intelligence Program and Activities." FAS. November 26, 1997. http://www.fas.org/irp/world/russia/program/humint.htm (accessed July 25, 2014).
Woodyard, Chris. "Milken 2014: Russia could wage cyber war on U.S." USAtoday. April 30, 2014. http://www.usatoday.com/story/money/business/2014/04/30/russia-cyber-attack/8500661/ (accessed July 25, 2014).

--------------------------------------------
[ 1 ]. (Woodyard 2014)
[ 2 ]. (MPS BAA Announcement n.d.)
[ 3 ]. (Lawrence 2014)
[ 4 ]. (BAA 2012)
[ 5 ]. (Kronenfeld 2014)
[ 6 ]. (Pike 1997)
[ 7 ]. (Lindborg 1997)

Similar Documents

Premium Essay

National Intelligence Strategy Analysis

...The National Intelligence Strategy discusses strategic threats confronting the U.S. national security environment in which nation states, highly capable non-state actors, and other transnational forces will continue to compete with and challenge U.S. national interests. Of the threats/issues listed under the "Strategic Environment," identify (and elaborate on) the three you feel represent the greatest challenge for U.S. national security. I feel that China, North Korea and violent extremist groups pose the greatest threats to United States national security. China has an interest in the stability of East Asia, but its strategic intentions are unclear and its military modernization is of great concern to the U.S. A quarter century after beginning...

Words: 695 - Pages: 3

Premium Essay

Drones Pros Cons

...The controversy surrounding drone practice for targeted killing is questionable ethically, legally, and strategically. The U.S. policy of drone warfare is directly correlated with the war on terrorism. The aftermath of 9/11 convinced the U.S. military and intelligence community to target Taliban and al-Qaeda militants by utilizing drone technology. The Authorization for Use of Military Force permits the use of all necessary and appropriate force against terrorism. The U.S government to justify drone strikes without restrictions has used this settlement as a defense mechanism. Drone technology promotes secrecy, governmental power, and a foreign policy that operates without limitations. The issue of drone technology is analyzed using the ethical...

Words: 2160 - Pages: 9

Premium Essay

Hazard Identification And Risk Assessment (THIRA)

...According to reports from the Department of Homeland Security, Al Qaeda leaders have issued orders to their members and radical associates to bring the war to the West by infiltrating cities and communities. Their goal is to blend in with regular society and when the time is right strike with severe blows killing as many people as possible, with the stress of seasonal threats attacks such as this could cripple the most functional cities . Local leaders have been directed to revisit there National Preparedness System plans and complete a Threat and Hazard Identification and Risk Assessment (THIRA). According to the DHS National Protection Framework Guide "it is the local governments that are responsible for the public safety, security,...

Words: 306 - Pages: 2

Premium Essay

Obama Liberalism Analysis

...realist aspirations. Although the President did take a decidedly realist approach to relations with China and the “pivot to Asia”, U.S. interests are better served through liberalists method. What follows is a detailed analysis of President Obama as a realist, the shortfalls of his approach, where other approaches may be more appropriate, and lessons from a past President. The first tenet of Realism supports that history is a sequence of cause and effects. At the 2014 speech at West Point (USMA), President Obama illustrated this tenet with the...

Words: 1457 - Pages: 6

Free Essay

Frrfrf

...No. 2106 February 8, 2008 Trojan Dragon: China’s Cyber Threat John J. Tkacik, Jr. America’s counterintelligence czar, Dr. Joel F. Brenner, painted an alarming picture of economic espionage in 2006, albeit in the objective tones and neutral parlance of the intelligence community. He reported to Congress that “foreign collection efforts have hurt the United States in several ways”: • Foreign technology collection efforts have “eroded the US military advantage by enabling foreign militaries to acquire sophisticated capabilities that might otherwise have taken years to develop.” • “[M]assive” industrial espionage has “undercut the US economy by making it possible for foreign firms to gain a competitive economic edge over US companies.” Dr. Brenner characterizes China as “very aggressive” in acquiring U.S. advanced technology. “The technology bleed to China, among others, is a very serious problem,” he said in March 2007, noting that “you can now, from the comfort of your own home or office, exfiltrate information electronically from somebody else’s computer around the world without the expense and risk of trying to grow a spy.” On November 15, 2007, the bipartisan, congressionally chartered U.S.–China Economic and Security Review Commission (USCC) put a finer point on it: “Chinese espionage activities in the United States are so extensive that they comprise the single greatest risk to the security of American technolo- gies.” Cyberpenetration is by far China’s most effective...

Words: 8993 - Pages: 36

Premium Essay

Digital Crimes

...practices. This paper documents the increasing rate of computer-based crime, points out several critical areas where it differs from more traditional crimes, and outlines some new problems and issues which law enforcement must address to combat computer crime. Finally, this paper suggests a plan of action suitable for many law enforcement agencies to prepare for dealing with computer based crime.The Birth of "hacking" Early use of the term "hacker" was applied to computer hobbyists who spent their spare time creating video games and other basic computer programs. However, this term acquired a negative connotation in the 1980s when computer experts illegally accessed several high-profile databanks. Databases at the Los Alamos National Laboratory (a center of nuclear weapons research) and the Sloan-Kettering Cancer Center in New York City were among their targets. The introduction of relatively inexpensive personal computers and modems helped...

Words: 1250 - Pages: 5

Premium Essay

Assignment 1: Digital Computer Crimes

...2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second category of computer crimes is the computer used as an instrument of a crime, this means the...

Words: 1501 - Pages: 7

Free Essay

Customs and Border Protection

...the Department of Homeland Security (DHS). This paper will provide you with facts, highlights, and challenges germane to CBP. You will understand how CBP interacts and operates with the intelligence community and the Armed Forces in order to meet up to their responsibilities. U.S. Customs and Border Protection History The origin of Customs and Border Protection can be dated back as early as the mid-1789, when U.S. congress passed the third of three acts that provided for administering customs tariffs and collecting duties. The Tariff Act of July 4, 1789 had also been passed by Congress followed by the Duties on Tonnage statute on July 20. Another landmark in the history of CBP is the establishment of the 1891 Immigration Act, which created the Office of the Superintendent of Immigration in the Treasury Department. The act allowed for the superintendent to have oversight of the new corps of immigrant inspectors stationed at the country’s principal ports of entry (CBP.Gov, 2014). On May 28, 1924, Congress established the Border Patrol as part of the Immigration Bureau in the Department of Labor through the Labor Appropriation Act of 1924 (CBP.Gov, 2014). The Border Patrol department became the more well-known of them all by majority Americans; they have been responsible for making our territorial lines secure. The attack of 9/11 has transformed the Border Patrol office by emerging the office into the Department of Homeland Security, in turn aligning with its...

Words: 3909 - Pages: 16

Premium Essay

Responsibilities of the Department of Justice

...The Department of Justice (DOJ) has the responsibility for enforcing the federal laws in the United States of America. The four agencies of the DOJ are the Federal Bureau of Investigation (FBI), U.S. Marshals, the Bureau of Alcohol, Tobacco, and Firearms (ATF), and the Drug Enforcement Administration (DEA). The person who is at the top of the DOJ, and leads each of these agencies, is the United States Attorney General. The major functions of the four agencies of the DOJ and who, to me, has the greatest responsibility within this agency follows. The FBI’s authority is actually broader than the other three agencies. The FBI’s mission is “to protect and defend the United States against terrorist and foreign intelligence threats and to enforce the criminal laws of the United States” (Federal Bureau of Investigation, pg. 1). Among its top three national security priorities are terrorism, counterintelligence, and cyber-crime. The terrorism priority addresses concerns such as international terrorism, domestic terrorism, and weapons that can cause mass destruction. The counterintelligence priority focuses on espionage and counter proliferation while the cyber-crime priority is focused on computer intrusions, internet fraud, and identity theft. All three of these pose a threat to the security of our nation. The FBI also has five major criminal priorities. The public corruption priority addresses government fraud, election fraud, and any corrupt foreign practice. A priority of the FBI...

Words: 1776 - Pages: 8

Free Essay

Peer Competitors Come Second to Terrorism

...rivalry. When nations see competition, they start acting and responding differently internationally and nationally in an attempt to combat this competition. Additionally, the choices a state makes when looking at state competition can lead to issues that can easily threaten the organization of power within the international realm. Russia is a prime example of a state that is attempting to challenge the United States’ quest for power. The actions Russia (or the U.S.) takes or does not take will be the direct result to something more serious such as embargos, alliances, a plethora of international policies and/or full scale war. Russia’s bold international moves to support the annexation of Crimea and blatant violation of arms treaty against the U.S. are signs of Russia challenging not only the United States’ power but the global balance of power as it is understood in today’s modern world. Blatantly lashing out and cheating treaties aren’t the only ways a nation can come to be a potential threat to the United States’ security. China is a prime candidate for being a more subtle peer-competitor because they have become an economic powerhouse over the last ten years and if they continue to grow they very well could take steps to make themselves the dominant power as opposed to one of the few global powers. However, the United States can combat these peer competitors with many tools such as policy and alliance...

Words: 3791 - Pages: 16

Premium Essay

Supervisor

...Cyber Security Student: Maurice Jones Class ISSC461: IT Security: Countermeasures Instructor: Professor Christopher Weppler Date: 2 August 2013 Introduction “In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home (President Barack Obama, 2012).” Technology has changed the total lifestyle of people around the world. Here in the United Stated, society’s daily lives revolve around social interaction, economic stability, job security and information dominance. Information Dominance is “the degree of information superiority that allows the possessor to use information systems and capabilities to achieve an operational advantage in a conflict or to control the situation in operations other than war while denying those capabilities to the adversary (US Cyber Command, 2012).” Corporations as well as many of the world’s governments have risen and fallen due to their degree of Information Dominance and Information Security. Cyber-attacks have increased exponentially within the last 10 years. Battlefield lines that were once drawn in the sand no longer exist. Cyber-attacks can occur from any location in the world and at any time. A Cyber-terrorist has the ability to use current communication infrastructure to launch an attack that could cripple a nation. In 2012, Defense Secretary, Leon Panetta spoke at the Business Executives for National Security (BENS) summit....

Words: 3217 - Pages: 13

Premium Essay

Global Business Today 5e

...Do you think governments should consider human rights when granting preferential trading rights to countries? What are the arguments for and against taking such a position? Political arguments for government intervention into international trade cover a range of issues, including protecting jobs, protecting industries deemed important for national security, and retaliating against unfair foreign competition. Protecting jobs and industries from unfair competition is the most common political argument for government intervention. For example, the Japanese quotas on rice imports are aimed at protecting jobs in that country's agricultural sector. In terms of protecting industries deemed important for national security, countries sometimes argue that it is necessary to protect certain industries (like aerospace, steel, advanced electronics, etc.) because they are important for national security. Finally, with regard to retaliating against foreign competition, some people argue that governments should use the threat to intervene in trade policy as a bargaining tool to help open foreign markets and force trading partners to "play by the rules of the game." In addition to these, political arguments for government intervention might also be motivated by the desire of governments to protect consumers from unsafe products, further its foreign policy objectives, protect human rights in trade partner nations, and protect the environment from pollution and degradation arising...

Words: 823 - Pages: 4

Premium Essay

National Security

...Running head: National Security National Security Teresa Turner Strayer University Garner Campus ECO320503016*201005 Professor Carol Scott December 3, 2010 Abstract The National Security Council is a forum for President’s to consider national security and foreign policy matters with their senior national security advisors and cabinet officials. The council started under President Truman, and the Council’s function is to advise and assist the President on national security and foreign policies. The Council is also the President’s principal arm for coordinating these policies among various government agencies. National Security is based on four basic strategies to preserve security. The defense and deterrence rank first and second, followed by détente diplomacy and disarmament. These four strategies are used whether in combination or alone. Technology has always influenced their strategy. When technology changes, what the country does to protect themselves changes too. This will entail what the U.S. goals are and what we stand for. Third, I will look at how the United States strengthens alliances to defeat global terrorism and work to prevent attacks against our friends and us. Fourth, I will explain how we work with others to defuse regional conflicts. National Security The struggles of the twentieth century between liberty and totalitarianism ended with victory for the forces of freedom—and a single sustainable model for national success:...

Words: 3062 - Pages: 13

Premium Essay

Homeland

...existing countermeasures in the State of Florida. Being a highly susceptible region for illegal immigration coming across the border, Florida has a close watch for terroristic threats. The following pages will review the threats and measures taken in the State of Florida. Domestic Terrorism Domestic terrorism can be defined as a threatened use, or unlawful use, of violence or force by an individual or group that is operating without any foreign direction within the country and as an act that is violent and dangerous to human life and also against the jurisdiction of the country (Terrorism, 2005). Explosives, weapons, and chemicals are common means of violence in terrorist attacks. As the appendix lists, there are several types of terroristic attacks that must be watched for such as bombings, sniper attacks, biological weapons, and cyber viruses and counter action and safety measures must be planned. Victims can are defined as society. This includes civilians, government workers, the military, first responders, or any stakeholder within the region being terrorized. While reasons for attacks can vary, political motivations along with religious differences and social ideas are the main culprits. When terrorists are planning attacks they may obtain materials such as weapons, vehicles, and security keys, or map out routes, observe particular places and people, time traffic lights and response times, and even receive training specifically for their mission (Jean, 2012)...

Words: 2135 - Pages: 9

Free Essay

Turkish Foreign Policy During the Cold War

...acceptance by the West sincerely. European members of NATO did not want to risk of war again because of Turkey who was under the Soviet threat at that time. At the same time, they were not willing to impart that the U.S. Marshall Aid to Turkey. Britain lost its efficiency in the Middle East as in all the world and for that reason Britain was put forward a project that "Commander of the Middle East" which Turkey will play a key role for gain efficiency again. Due to U.S. opposition to this prediction, this project got shelved.In the "Containment Policy" process which started with Truman Doctrine by U.S. against the Soviet Bloc, military and geo-strategic location of Turkey opened the door to NATO membership.With North Korea's attack on South Korea, the Korean War started in 1950-53 and the Turkey participating in United States’s side, this was resulting against all suspicies and prejudice, Turkey took place between NATO member countries.Russians wishes to change of Straits regime which determined with Montreux Convention, played a role in accelerating. Turkey was adopted in NATO after the third application on February 18, 1952. After the multiparty system adopted in 1946 , Democratic Party came to power in Turkey where this party remain in power between the 1950-60, there were three basic goals: 1- Become to elements of stability and security on its...

Words: 3746 - Pages: 15