SlideShare a Scribd company logo
1 of 8
AMERICAN PUBLIC UNIVERSITY SYSTEM
FINAL PAPER
KAELA SEAY
INTL434: Threat Analysis
26 February 2017
FINAL PAPER: ESSAY QUESTION ONE
Throughout history, threats have evolved significantly.
Following the terrorist attacks on September 11th, 2001, the
face of threats began to change. Traditionally, threats originated
from other nation and nation-states’ military forces. However,
threats can now originate from a plethora of other, non-
traditional sources that can potentially pose a far more
dangerous threat. The infinite possibilities of threat that can be
faced forces the United States government to analyze these new
threats, their capabilities, and how they need to adjust their
approach to better detect, prevent, and combat them. This essay
will discuss where non-traditional threats may originate, how
capable they are, how the United States government should
approach them, and the problems they may face when doing so.
Today, the United States government faces many threats
from non-state actors. Non-states can be anything a nation-state
is not. Non-state threats are considered non-traditional threats,
which makes analyzing them more difficult. These new, non-
state actor threats can originate from one of the following
sources: terrorist organization, criminal organizations, private
organizations, extremist activist groups, lone wolf actors, and
even pirates. Today, one of the largest threats the United States
finds itself faced with is terrorist that originates from terrorist
organizations. Non-traditional threats have presented the United
States “with adversaries that are constantly changing and
adapting to their environment and who will present fewer
obvious patterns to analyze” (Haddock, n.d.). With the endless
number of possible threats the United States is faced with, it
would be impractical for the United States government to
approach all non-state actor threats unilaterally.
Non-state actors have evolved into extremely capable and
resourceful entities. “International terrorism once threatened
Americans only when they were outside the country. Today
international terrorists attack us on our own soil” (Countering
the Changing Threat of International Terrorism, n.d.). One of
the most common examples of a terrorist organization that the
United States has faced threats from is Al Qaeda. Non-state
actors such as Al Qaeda have similar characteristics, which
include: international operations, funding, and logistical
networks, less dependence on state sponsors, developed
communication technologies, and lethal objectives (Countering
the Changing Threat of International Terrorism, n.d.). Due to
the capabilities of non-state actors, the United States
government must look to international cooperation to detect,
prevent, and combat these non-traditional threats.
Detecting, preventing, and combatting non-traditional
threats from non-state actors such as terrorism is no easy task.
Following the terrorist attacks on September 11th, 2001, the
United States government found a renewed sense of urgency.
Agencies and task forces such as the Joint Interagency Task
Force (JIATF), United Nations Counterterrorism Center
(UNCCT), INTERPOL, and Financial Action Task Force
(FATF) have been established as an effort to counter terrorism
(The Global Regime for Terrorism, 2011). Additionally,
international conventions have been supported in order to
improve multilateral addressing threats from non-state actors.
However, “combating terrorism has been hampered by the
increased organizational efficiency of terrorist groups (e.g.
leaderless networks) and ineffective use of brute force and
targeted killings by the state (in Chechnya and Palestine)”
(Srikanth, n.d.).
Though counterterrorism efforts have improved significantly in
recent years, counterterrorism efforts are still inadequate. One
problem with international cooperation regarding
counterterrorism efforts is the lack of leadership. With no one
entity that oversees counterterrorism, the effort as a whole is
left rather unorganized. A lack of leadership to oversee
counterterrorism efforts leads to another problem. Another
problem with international cooperation regarding
counterterrorism efforts is the lack of responsibility in ensuring
all members who play a part in counterterrorism efforts are
truly contributing. It is possible for members to not accept their
responsibilities if their views on the importance of
counterterrorism differ. If members who play a part in
counterterrorism efforts are not contributing, the impact the
effort has is diminished. Additionally, another problem with
international cooperation regarding counterterrorism efforts is
the lack of sharing intelligence between agencies. Without
sharing intelligence regarding non-state actors, not all members
who play a part in counterterrorism efforts will have the
intelligence they need in order to oversee their responsibilities.
However, “without international cooperation, the United States
cannot protect its national infrastructure from the cyber
threat”(Countering the Changing Threat of International
Terrorism, n.d.). The United States and its allies are forced to
develop a better approach to detect, prevent, and combat these
non-traditional, non-state threats.
Throughout history, threats have shifted from traditional threats
to non-traditional threats. Non-traditional threats are somewhat
of an unknown territory. They can originate from an infinite
number of sources, which have significantly developed
resources and connections, which makes them harder to detect,
prevent, and combat. The terrorist attacks on September 11th,
2001, enlightened how serious of an issue these threats were to
not only the United States, but the whole world. Shortly after,
counterterrorism efforts were established and implemented.
Despite the world’s renewed sense of urgency regarding these
threats, counterterrorism efforts were noticeably insufficient. In
recent years, non-traditional threats have become an even
greater concern. The United States and its allies have come
together to improve multilateral counterterrorism efforts to
better detect, prevent, and combat these threats and, therefore,
ensure national security.
FINAL PAPER: ESSAY QUESTION TWO
World politics, strategic intelligence, and national
intelligence have become increasingly complex throughout
history. They are, however, imperative in modern governments
throughout the world. These factors assist governments in
accomplishing policy making and planning as well as
implementing and overseeing policy plans. Two fundamental
views regarding intelligence within the United States originated
from Sherman Kent and Willmoore Kendall. This essay will
discuss the most important differences between Sherman Kent
and Willmoore Kendall’s visions of intelligence, why those
differences are important as well as which of their visions might
be most applicable today and why.
Sherman Kent and Willmoore Kendall’s visions of
intelligence differed significantly. Kent’s vision of intelligence
was based heavily on a non-democratic, self-sufficient
intelligence unit and the relationship between ”producers and
consumers of intelligence” (Davis, 1991, Pg. 92). Unlike Kent,
Kendall’s vision of intelligence was far more complex and was
based heavily on a democratic and philosophical intelligence
unit. Though their visions of intelligence varied greatly,
Kendall complimented Kent for his expertise in terminology and
organizational maps of intelligence in Strategic Intelligence.
Kent and Kendall’s visions of intelligence differed in regards to
the purpose of intelligence units and policy making. Kent’s
vision of intelligence included an intelligence unit, which
provided knowledge of the world for the purpose of taking
action while being objective to policy makers’ expectations and
means of distraction. Kent believed that the relationship
between producers and consumers of intelligence was a delicate
one, as they cannot be to close, nor can they be too far away.
However, Kendall disagreed. Kendall’s vision of intelligence
included an intelligence unit, which provided knowledge of the
world for the purpose of assisting political leaders with
achieving foreign policy goals and assisting the United States
government with understanding which factors it could influence
greatly. Kendall believed that the relationship between
producers and consumers of intelligence was somewhat delicate
as Kent believed, but it needed to be more structured.
Additionally, he believed that if an intelligence unit’s duties
were lessened as a result of policy making, Kent’s disgusts in
domestic United States politics were self-defeating.
Additionally, Kent and Kendall’s visions of intelligence
differed in regards to research as a solution to certain
situations. Kent believe that research could benefit strategic
intelligence. He expressed that, “research is the only process
which we of the liberal tradition are willing to admit is capable
of giving us the truth, or a close approximation to truth”
(Olcott, 2009). On the other hand, Kendall believed that
research could not indefinitely benefit strategic intelligence.
Kendall commented on Kent’s visions regarding research and
stated that his visions were a “crassly empirical conception of
the research process” (Davis, 1991, Pg. 95). Instead, Kendall
contested Kent’s beliefs and stated that a United States
intelligence unit should be stimulated by working conditions
that encourage a better thought process.
The differences in Kent and Kendall’s visions of
intelligence are important and worth discussing, as they provide
a fundamental knowledge and understanding of strategic
intelligence from the past, in the present, and even into the
future for the Unite States. Kent and Kendall’s visions played a
part in how intelligence in the United States has evolved. One
of the first examples of these views on strategic intelligence
impacting the United States government took place during the
early 1960s when the Central Intelligence Agency’s (CIA’s)
quarters were relocated. Differences between President
Eisenhower and President Kennedy’s terms were described as,
“Under Eisenhower, the making of policy was like a football
game, with a play for intelligence analysts called in each
huddle. Under Kennedy, it was like a basketball game with the
players in constant motion” (Davis, 1991, Pg. 98). A second
example of how these views on strategic intelligence impacted
the United States government took place during the early 1970s
when the CIA became reserved and self-sufficient. A third
example of how these views on strategic intelligence impacted
the United States government took place during the early 1980s
when the Deputy Director for Intelligence, Robert M. Gates
introduced a new doctrine, which reflected both Kent and
Kendall’s visions of intelligence. Finally, Kent and Kendall’s
visions or intelligence influenced today’s intelligence studies to
be more collective. Intelligence studies now allow students to
become more well-versed and educated on more than one aspect
of strategic intelligence.
Kent’s visions of strategic intelligence are most applicable
today, as they take into consideration the producers and
consumers of intelligence and not just the consumers. Kent’s
visions of intelligence argued the importance of the relationship
between producers and consumers of intelligence. He believed
that analysts needed to remain objective an unbiased by policy
makers’ expectations or attempts of influence. By doing so,
analysts can provide genuine knowledge of the world to assist
the United States government with action taking.
Intelligence in the United States has evolved significantly
throughout history. Kent and Kendall’s visions of intelligence
are considerably different. However, their visions of
intelligence are not mutually exclusive. Both of their views
have played and continue to play fundamental roles in strategic
intelligence within the United States. Although, the United
States government would likely benefit most if Kent’s visions
of intelligence were applied today due to its consideration to
both producers and consumers of intelligence.
References:
Countering the Changing Threat of International Terrorism.
(n.d.). Retrieved February 20, 2017, from
https://fas.org/irp/threat/commission.html
Davis, Jack. "The Kent-Kendall Debate of 1949." 1991.
Accessed February 21, 2017.
https://www.cia.gov/library/center-for-the-study-of-
intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf.
The Global Regime for Terrorism. (2011, August). Retrieved
February 20, 2017, from http://www.cfr.org/terrorism/global-
regime-terrorism/p25729
Haddock, Ginny. "Lecture 1: Introduction to "Threats"." APUS
CLE. Accessed January 25, 2017.
https://edge.apus.edu/portal/site/337557/page/3ccdc2ea-9faa-
48eb-83f2-b7dc9c2da2d8.
Olcott, Anthony. "Peeling Facts off the Face of the Unknown."
August 24, 2009. Accessed February 21, 2017.
https://www.cia.gov/library/center-for-the-study-of-
intelligence/csi-publications/csi-
studies/studies/vol53no2/peeling-facts-off-the-face-of-the-
unknown.html.
Srikanth, D. (n.d.). NON-TRADITIONAL SECURITY
THREATS IN THE 21ST CENTURY: A REVIEW. Retrieved
February 20, 2017, from
http://www.ijdc.org.in/uploads/1/7/5/7/17570463/2014junearticl
e4.pdf

More Related Content

More from nettletondevon

Your NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docxYour NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docxnettletondevon
 
Your namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docxYour namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docxnettletondevon
 
Your nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxYour nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxnettletondevon
 
Your name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docxYour name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docxnettletondevon
 
Your NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docxYour NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docxnettletondevon
 
Your Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docxYour Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docxnettletondevon
 
Your Name Professor Name Subject Name 06 Apr.docx
Your Name  Professor Name  Subject Name  06 Apr.docxYour Name  Professor Name  Subject Name  06 Apr.docx
Your Name Professor Name Subject Name 06 Apr.docxnettletondevon
 
Your muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docxYour muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docxnettletondevon
 
Your midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docxYour midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docxnettletondevon
 
Your local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docxYour local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docxnettletondevon
 
Your letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docxYour letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docxnettletondevon
 
Your legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docxYour legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docxnettletondevon
 
Your Last Name 1Your Name Teacher Name English cl.docx
Your Last Name  1Your Name Teacher Name English cl.docxYour Last Name  1Your Name Teacher Name English cl.docx
Your Last Name 1Your Name Teacher Name English cl.docxnettletondevon
 
Your job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docxYour job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docxnettletondevon
 
Your job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docxYour job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docxnettletondevon
 
Your job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docxYour job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docxnettletondevon
 
Your Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docxYour Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docxnettletondevon
 
Your instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docxYour instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docxnettletondevon
 
Your initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docxYour initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docxnettletondevon
 
Your initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docxYour initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docxnettletondevon
 

More from nettletondevon (20)

Your NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docxYour NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docx
 
Your namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docxYour namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docx
 
Your nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxYour nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docx
 
Your name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docxYour name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docx
 
Your NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docxYour NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docx
 
Your Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docxYour Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docx
 
Your Name Professor Name Subject Name 06 Apr.docx
Your Name  Professor Name  Subject Name  06 Apr.docxYour Name  Professor Name  Subject Name  06 Apr.docx
Your Name Professor Name Subject Name 06 Apr.docx
 
Your muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docxYour muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docx
 
Your midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docxYour midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docx
 
Your local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docxYour local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docx
 
Your letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docxYour letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docx
 
Your legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docxYour legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docx
 
Your Last Name 1Your Name Teacher Name English cl.docx
Your Last Name  1Your Name Teacher Name English cl.docxYour Last Name  1Your Name Teacher Name English cl.docx
Your Last Name 1Your Name Teacher Name English cl.docx
 
Your job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docxYour job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docx
 
Your job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docxYour job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docx
 
Your job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docxYour job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docx
 
Your Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docxYour Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docx
 
Your instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docxYour instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docx
 
Your initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docxYour initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docx
 
Your initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docxYour initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docx
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx

  • 1. AMERICAN PUBLIC UNIVERSITY SYSTEM FINAL PAPER KAELA SEAY INTL434: Threat Analysis 26 February 2017 FINAL PAPER: ESSAY QUESTION ONE Throughout history, threats have evolved significantly. Following the terrorist attacks on September 11th, 2001, the face of threats began to change. Traditionally, threats originated from other nation and nation-states’ military forces. However, threats can now originate from a plethora of other, non- traditional sources that can potentially pose a far more dangerous threat. The infinite possibilities of threat that can be faced forces the United States government to analyze these new threats, their capabilities, and how they need to adjust their approach to better detect, prevent, and combat them. This essay
  • 2. will discuss where non-traditional threats may originate, how capable they are, how the United States government should approach them, and the problems they may face when doing so. Today, the United States government faces many threats from non-state actors. Non-states can be anything a nation-state is not. Non-state threats are considered non-traditional threats, which makes analyzing them more difficult. These new, non- state actor threats can originate from one of the following sources: terrorist organization, criminal organizations, private organizations, extremist activist groups, lone wolf actors, and even pirates. Today, one of the largest threats the United States finds itself faced with is terrorist that originates from terrorist organizations. Non-traditional threats have presented the United States “with adversaries that are constantly changing and adapting to their environment and who will present fewer obvious patterns to analyze” (Haddock, n.d.). With the endless number of possible threats the United States is faced with, it would be impractical for the United States government to approach all non-state actor threats unilaterally. Non-state actors have evolved into extremely capable and resourceful entities. “International terrorism once threatened Americans only when they were outside the country. Today international terrorists attack us on our own soil” (Countering the Changing Threat of International Terrorism, n.d.). One of the most common examples of a terrorist organization that the United States has faced threats from is Al Qaeda. Non-state actors such as Al Qaeda have similar characteristics, which include: international operations, funding, and logistical networks, less dependence on state sponsors, developed communication technologies, and lethal objectives (Countering the Changing Threat of International Terrorism, n.d.). Due to the capabilities of non-state actors, the United States government must look to international cooperation to detect, prevent, and combat these non-traditional threats. Detecting, preventing, and combatting non-traditional threats from non-state actors such as terrorism is no easy task.
  • 3. Following the terrorist attacks on September 11th, 2001, the United States government found a renewed sense of urgency. Agencies and task forces such as the Joint Interagency Task Force (JIATF), United Nations Counterterrorism Center (UNCCT), INTERPOL, and Financial Action Task Force (FATF) have been established as an effort to counter terrorism (The Global Regime for Terrorism, 2011). Additionally, international conventions have been supported in order to improve multilateral addressing threats from non-state actors. However, “combating terrorism has been hampered by the increased organizational efficiency of terrorist groups (e.g. leaderless networks) and ineffective use of brute force and targeted killings by the state (in Chechnya and Palestine)” (Srikanth, n.d.). Though counterterrorism efforts have improved significantly in recent years, counterterrorism efforts are still inadequate. One problem with international cooperation regarding counterterrorism efforts is the lack of leadership. With no one entity that oversees counterterrorism, the effort as a whole is left rather unorganized. A lack of leadership to oversee counterterrorism efforts leads to another problem. Another problem with international cooperation regarding counterterrorism efforts is the lack of responsibility in ensuring all members who play a part in counterterrorism efforts are truly contributing. It is possible for members to not accept their responsibilities if their views on the importance of counterterrorism differ. If members who play a part in counterterrorism efforts are not contributing, the impact the effort has is diminished. Additionally, another problem with international cooperation regarding counterterrorism efforts is the lack of sharing intelligence between agencies. Without sharing intelligence regarding non-state actors, not all members who play a part in counterterrorism efforts will have the intelligence they need in order to oversee their responsibilities. However, “without international cooperation, the United States cannot protect its national infrastructure from the cyber
  • 4. threat”(Countering the Changing Threat of International Terrorism, n.d.). The United States and its allies are forced to develop a better approach to detect, prevent, and combat these non-traditional, non-state threats. Throughout history, threats have shifted from traditional threats to non-traditional threats. Non-traditional threats are somewhat of an unknown territory. They can originate from an infinite number of sources, which have significantly developed resources and connections, which makes them harder to detect, prevent, and combat. The terrorist attacks on September 11th, 2001, enlightened how serious of an issue these threats were to not only the United States, but the whole world. Shortly after, counterterrorism efforts were established and implemented. Despite the world’s renewed sense of urgency regarding these threats, counterterrorism efforts were noticeably insufficient. In recent years, non-traditional threats have become an even greater concern. The United States and its allies have come together to improve multilateral counterterrorism efforts to better detect, prevent, and combat these threats and, therefore, ensure national security. FINAL PAPER: ESSAY QUESTION TWO World politics, strategic intelligence, and national intelligence have become increasingly complex throughout history. They are, however, imperative in modern governments throughout the world. These factors assist governments in accomplishing policy making and planning as well as implementing and overseeing policy plans. Two fundamental views regarding intelligence within the United States originated from Sherman Kent and Willmoore Kendall. This essay will discuss the most important differences between Sherman Kent and Willmoore Kendall’s visions of intelligence, why those differences are important as well as which of their visions might be most applicable today and why. Sherman Kent and Willmoore Kendall’s visions of intelligence differed significantly. Kent’s vision of intelligence was based heavily on a non-democratic, self-sufficient
  • 5. intelligence unit and the relationship between ”producers and consumers of intelligence” (Davis, 1991, Pg. 92). Unlike Kent, Kendall’s vision of intelligence was far more complex and was based heavily on a democratic and philosophical intelligence unit. Though their visions of intelligence varied greatly, Kendall complimented Kent for his expertise in terminology and organizational maps of intelligence in Strategic Intelligence. Kent and Kendall’s visions of intelligence differed in regards to the purpose of intelligence units and policy making. Kent’s vision of intelligence included an intelligence unit, which provided knowledge of the world for the purpose of taking action while being objective to policy makers’ expectations and means of distraction. Kent believed that the relationship between producers and consumers of intelligence was a delicate one, as they cannot be to close, nor can they be too far away. However, Kendall disagreed. Kendall’s vision of intelligence included an intelligence unit, which provided knowledge of the world for the purpose of assisting political leaders with achieving foreign policy goals and assisting the United States government with understanding which factors it could influence greatly. Kendall believed that the relationship between producers and consumers of intelligence was somewhat delicate as Kent believed, but it needed to be more structured. Additionally, he believed that if an intelligence unit’s duties were lessened as a result of policy making, Kent’s disgusts in domestic United States politics were self-defeating. Additionally, Kent and Kendall’s visions of intelligence differed in regards to research as a solution to certain situations. Kent believe that research could benefit strategic intelligence. He expressed that, “research is the only process which we of the liberal tradition are willing to admit is capable of giving us the truth, or a close approximation to truth” (Olcott, 2009). On the other hand, Kendall believed that research could not indefinitely benefit strategic intelligence. Kendall commented on Kent’s visions regarding research and stated that his visions were a “crassly empirical conception of
  • 6. the research process” (Davis, 1991, Pg. 95). Instead, Kendall contested Kent’s beliefs and stated that a United States intelligence unit should be stimulated by working conditions that encourage a better thought process. The differences in Kent and Kendall’s visions of intelligence are important and worth discussing, as they provide a fundamental knowledge and understanding of strategic intelligence from the past, in the present, and even into the future for the Unite States. Kent and Kendall’s visions played a part in how intelligence in the United States has evolved. One of the first examples of these views on strategic intelligence impacting the United States government took place during the early 1960s when the Central Intelligence Agency’s (CIA’s) quarters were relocated. Differences between President Eisenhower and President Kennedy’s terms were described as, “Under Eisenhower, the making of policy was like a football game, with a play for intelligence analysts called in each huddle. Under Kennedy, it was like a basketball game with the players in constant motion” (Davis, 1991, Pg. 98). A second example of how these views on strategic intelligence impacted the United States government took place during the early 1970s when the CIA became reserved and self-sufficient. A third example of how these views on strategic intelligence impacted the United States government took place during the early 1980s when the Deputy Director for Intelligence, Robert M. Gates introduced a new doctrine, which reflected both Kent and Kendall’s visions of intelligence. Finally, Kent and Kendall’s visions or intelligence influenced today’s intelligence studies to be more collective. Intelligence studies now allow students to become more well-versed and educated on more than one aspect of strategic intelligence. Kent’s visions of strategic intelligence are most applicable today, as they take into consideration the producers and consumers of intelligence and not just the consumers. Kent’s visions of intelligence argued the importance of the relationship between producers and consumers of intelligence. He believed
  • 7. that analysts needed to remain objective an unbiased by policy makers’ expectations or attempts of influence. By doing so, analysts can provide genuine knowledge of the world to assist the United States government with action taking. Intelligence in the United States has evolved significantly throughout history. Kent and Kendall’s visions of intelligence are considerably different. However, their visions of intelligence are not mutually exclusive. Both of their views have played and continue to play fundamental roles in strategic intelligence within the United States. Although, the United States government would likely benefit most if Kent’s visions of intelligence were applied today due to its consideration to both producers and consumers of intelligence. References: Countering the Changing Threat of International Terrorism. (n.d.). Retrieved February 20, 2017, from https://fas.org/irp/threat/commission.html Davis, Jack. "The Kent-Kendall Debate of 1949." 1991. Accessed February 21, 2017. https://www.cia.gov/library/center-for-the-study-of- intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf. The Global Regime for Terrorism. (2011, August). Retrieved February 20, 2017, from http://www.cfr.org/terrorism/global- regime-terrorism/p25729 Haddock, Ginny. "Lecture 1: Introduction to "Threats"." APUS CLE. Accessed January 25, 2017. https://edge.apus.edu/portal/site/337557/page/3ccdc2ea-9faa- 48eb-83f2-b7dc9c2da2d8. Olcott, Anthony. "Peeling Facts off the Face of the Unknown." August 24, 2009. Accessed February 21, 2017.
  • 8. https://www.cia.gov/library/center-for-the-study-of- intelligence/csi-publications/csi- studies/studies/vol53no2/peeling-facts-off-the-face-of-the- unknown.html. Srikanth, D. (n.d.). NON-TRADITIONAL SECURITY THREATS IN THE 21ST CENTURY: A REVIEW. Retrieved February 20, 2017, from http://www.ijdc.org.in/uploads/1/7/5/7/17570463/2014junearticl e4.pdf