SlideShare a Scribd company logo
THE ROLE OF
INTELLIGENCE AGENCIES ESPECIALLY THE
CENTRAL INTELLIGENCE AGENCY (CIA)
TO THE WORLD
TAMMY CHIAM
1.0 INTRODUCTION
Over the years, public views of the
intelligence agencies and its role in foreign policy
have been shaped primarily by
movies, television, novels, newspapers, books
by journalists, and essays by "experts" who either
have never served in the intelligence agency,
or have served and still not understood its role.
There have many of intelligence agencies
that set up by each country around the world.
Pakistan Inter-Service Intelligence (ISI)
Institute for Intelligence and Special Operation
Intelligence
collecting and processing of that information
about foreign countries and their agents which is needed
by a government for its foreign policy and for national security,
the conduct of non-attributable activities abroad
to facilitate the implementation of foreign policy,
and the protection of both process and product,
as well as persons and organizations concerned with these,
against unauthorized disclosure.
secret action aimed at understanding or changing what goes on abroad.
Intelligence agency refers to
a government institution which collects, analyze and
exploit valuable information and intelligence in support of
law enforcement, national security, military and foreign
policy objective and to lock the safety of nation.
In Malaysia, we have Kor Risik Diraja,
Malaysian Special Branch,
Malaysian National Security Council,
and National Security Division
to combat terrorism for maintaining
Malaysia’s security.
CIA is the most prominent and familiar
among other United States, then following by
Federal Bureau of Investigation (FBI),
National Security Agency (NSA),
and Defense Intelligence Agency (DIA).
As the Cold War recedes
into the past and a new world
order emerges, it is
important to understand why
intelligence was centralized
in the form it was. The
attack on World Trade
Center tower in New York
and the Pentagon in
Washington bring this
question into very sharp
focus.
2.0 BACKGROUND – THE HISTORY OF CIA
The need for agency that world centralize intelligence gathering became obvious after the
terrible tragedy of Pearl Harbor.
Intelligence at the time had some idea that attack was possible but there was no single voice
that dictated a loud enough to warning and to prevent it happen before it is too late.
President Roosevelt appointed New York lawyer William Joseph Donovan to draft a plan for
an intelligence service based on the M16 and SOE. After that, Donovan appointed as the
Coordinator of Information on 11 July 1941.
Office of Strategic Services (OSS)
established by President Roosevelt on 13 June 1942
William Joseph Donovan became the head of the OSS in 1942.
The OSS was a wartime intelligence agency and the forerunner to the CIA.
It had a mandate to collect and analyze strategic information. The OSS supplied
policymakers with facts and estimates but it never had jurisdiction over all foreign
intelligence activities.
conducting multiple activities and missions, including collecting intelligence by spying,
performing acts of sabotage, waging propaganda war, organizing and coordinating anti-Nazi
resistance groups in Europe, providing military training for anti-Japanese guerrilla
movement in Asia, among other things.
The OSS played a major role in training Kuomintang troops in China and
Burma, helped arms, train and supply resistance movements from 1943 to
1945. During the World War II, one of the greatest accomplishments of the
OSS was its penetrative of Nazi Germany by OSS operatives.
After the Japan surrendered and closed the chapter of the Pacific Theater of
Operations in the World War II, the OSS was abolished on 20 September 1945
by President Truman due to he signed Executive Order 9621.
President Truman created the Central Intelligence Group (CIG)
in January of 1946.
President Truman signed the National Security Act of 1947
establishing the CIA on 26 July 1947 to make a fully functional intelligence
office.
CIA was formed to serve for two purposes that were to gather information
about the capabilities and intentions of friendly and unfriendly nations and to
evaluate it and present it in some useful form to policy-makers.
3.0 THE ROLE OF INTELLIGENCE AGENCY
The on
 the Pearl Harbor by
the Japanese
World Trade Center
complex by the Islamic
terrorist group al-Qaeda
Paris -13 November 2015
**the rise of the Islamic State
of Iraq and Syria (ISIS)
The people need to protect by
government agencies especially from the
intelligence aspect.
It helps to country to cope with security
matters with gather the information that
may include espionage, terrorism, arms
trafficking and so on that related to
nation’s security.
ROLES
 provision of analysis in areas relevant to national security
 give early warning of impending crises, serve national and
international crisis management by helping to discern the intentions
of current or potential opponents
 inform national defense planning and military operations
 protect sensitive information secrets, both of their own sources and
activities, and those of other state agencies.
 collect the secret information that relating to the political and
economic activities of foreign states such as assassination, arms
trafficking, and the placement of misinformation …
1. Responsible for the collection and analysis of
intelligence and its distribution to policymakers
that were principally to the president, the
National Security Council (NSC) and the
Departments of State and Defense.
2. Charged with the conduct of covert action, the
one area in which it implements policy.
3. Played out in the interaction, primarily in
Washington, between the intelligence
community and the policymaking community.
4.0 COMPARISONS BETWEEN THE CIA AND FBI
not a law enforcement agency
but an intelligence agency for espionage
operations that was originally intended to only
deal with foreign affairs
had no authority to do any domestic
"spying".
has no authority to arrest anyone or to
enforce any laws likes the FBI.
It simply gathers information.
works only in foreign matters.
It is illegal for the CIA to investigate any
United States citizen or company inside the
United States, unless an investigation is part of
a foreign intelligence.
For example, the CIA may investigate an
American who's suspected of being part of a
terrorist plot being planned in a foreign
country.
domestic intelligence
and law enforcement agency.
does not work in foreign
countries.
As the investigative and
enforcement arm of the United
States Department of Justice,
investigates the violations of
federal criminal laws such as the
possession and sale of illegal
drug, cyber or computer-based
crimes and Medicare fraud.
has investigative and arrest
powers anywhere in the United
States where a federal criminal
law is violated.
CIA FBI
The biggest difference between the FBI and CIA
is the FBI’s nationwide reach.
State and local law enforcement agents typically
cannot enforce laws outside their specific
jurisdiction, such as their state, county or city.
Sometimes, the FBI also working hand-in-hand with the CIA
when foreign-based plots land on United States soil
when come to crimes, domestic or home-based
terrorist activities, and other civil right violations.
5.0 CONCLUSION
The intelligence agency is the first line of defense of the country
as its eyes and ears.
It helps the policymaker to understand and deal with the often
dangerous world around us.
An estimate after collecting the intelligence can provides a factual
review of subject and forecasts future development.
This also can prevent and stop the terrorism, danger, and war
before it happens and led to the consequence that we cannot bear.
This is done by trying to find out about plans to commit terrorism.
United States has the finest global intelligence service in the world.
The CIA’s assessment and research papers are the products of the
largest intelligence analysis organization in the world.
The intelligence’s work is not always the glamorous and exciting
missions likes what we read about in books or see on the television
shows and in the movie theater.
Lastly, intelligence agency is needed in every country in the world to
protect the country and the people from danger.
THANK YOU

More Related Content

What's hot

National Investigation Agency (NIA)
National Investigation Agency (NIA)National Investigation Agency (NIA)
National Investigation Agency (NIA)
Faris Fadalurahman
 
Raw- Research & Analysis Wing
Raw- Research & Analysis WingRaw- Research & Analysis Wing
Raw- Research & Analysis Wing
Nivin Vinoi
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
Doing What I Do
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime sceneBlancoScience
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
VAISHNAVI BHEDODKAR
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
Police and Detective Training Schools
Police and Detective Training SchoolsPolice and Detective Training Schools
Police and Detective Training Schools
Applied Forensic Research Sciences
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
Alok Yadav
 
Principles of fingerprints
Principles of fingerprintsPrinciples of fingerprints
Principles of fingerprints
Applied Forensic Research Sciences
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
Paul Wilson
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examination
kiran malik
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
Doing What I Do
 
Blood stain pattern analysis
Blood stain pattern analysisBlood stain pattern analysis
Blood stain pattern analysis
Sandeep Kumar Pathak
 
Agent handling
Agent handlingAgent handling
Crime scene investigation
Crime scene investigation  Crime scene investigation
Forensicphotography
ForensicphotographyForensicphotography
Forensicphotography
Cheldy S, Elumba-Pableo
 

What's hot (20)

Impression evidence
Impression evidenceImpression evidence
Impression evidence
 
Raw
RawRaw
Raw
 
National Investigation Agency (NIA)
National Investigation Agency (NIA)National Investigation Agency (NIA)
National Investigation Agency (NIA)
 
Raw- Research & Analysis Wing
Raw- Research & Analysis WingRaw- Research & Analysis Wing
Raw- Research & Analysis Wing
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime scene
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Police and Detective Training Schools
Police and Detective Training SchoolsPolice and Detective Training Schools
Police and Detective Training Schools
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
 
Principles of fingerprints
Principles of fingerprintsPrinciples of fingerprints
Principles of fingerprints
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examination
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 
Blood stain pattern analysis
Blood stain pattern analysisBlood stain pattern analysis
Blood stain pattern analysis
 
Agent handling
Agent handlingAgent handling
Agent handling
 
Crime scene investigation
Crime scene investigation  Crime scene investigation
Crime scene investigation
 
Forensicphotography
ForensicphotographyForensicphotography
Forensicphotography
 

Viewers also liked

C.I.A
C.I.A C.I.A
CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach Barber
Zachary Barber
 
Role of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIARole of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIA
myeasyway
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
Covert action studyguide
Covert action studyguideCovert action studyguide
Covert action studyguidekelsports
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
Doing What I Do
 
Communication
CommunicationCommunication
Communication
R Naveen Naveen
 
Elctntnqs
ElctntnqsElctntnqs
Elctntnqs
R Naveen Naveen
 
Effective writing skills _ transitional terms
Effective writing skills _  transitional termsEffective writing skills _  transitional terms
Effective writing skills _ transitional terms
Yin Doran
 
How to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha siglerHow to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha siglersamanthasigler123
 
Top ten secret inteligent agencies part one
Top ten secret inteligent agencies    part oneTop ten secret inteligent agencies    part one
Top ten secret inteligent agencies part one
Kingshuk Basu
 
Step4
Step4Step4
Step4xerx
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
Doing What I Do
 
Iraq & saddam Hussein
Iraq & saddam HusseinIraq & saddam Hussein
Iraq & saddam Hussein
myeasyway
 
17 c.i.a.
17   c.i.a.17   c.i.a.
17 c.i.a.
Mocte Salaiza
 

Viewers also liked (20)

C.I.A
C.I.A C.I.A
C.I.A
 
CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach Barber
 
Cia
CiaCia
Cia
 
CIA
CIACIA
CIA
 
Role of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIARole of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIA
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
Covert action studyguide
Covert action studyguideCovert action studyguide
Covert action studyguide
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Communication
CommunicationCommunication
Communication
 
Elctntnqs
ElctntnqsElctntnqs
Elctntnqs
 
Effective writing skills _ transitional terms
Effective writing skills _  transitional termsEffective writing skills _  transitional terms
Effective writing skills _ transitional terms
 
How to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha siglerHow to write a news article_mscm tools_samantha sigler
How to write a news article_mscm tools_samantha sigler
 
Perkeretaapian Indonesia Dalam Perspektif Internasional
Perkeretaapian Indonesia  Dalam Perspektif InternasionalPerkeretaapian Indonesia  Dalam Perspektif Internasional
Perkeretaapian Indonesia Dalam Perspektif Internasional
 
Top ten secret inteligent agencies part one
Top ten secret inteligent agencies    part oneTop ten secret inteligent agencies    part one
Top ten secret inteligent agencies part one
 
Step4
Step4Step4
Step4
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Iraq & saddam Hussein
Iraq & saddam HusseinIraq & saddam Hussein
Iraq & saddam Hussein
 
Report writing abhi
Report writing abhiReport writing abhi
Report writing abhi
 
17 c.i.a.
17   c.i.a.17   c.i.a.
17 c.i.a.
 

Similar to cia

Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
Amber Wheeler
 
Defense Against Terrorism
Defense Against TerrorismDefense Against Terrorism
Defense Against Terrorism
Stephanie Williams
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
melbruce90096
 
Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018
Richa Sharma
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
Zubair
 
The Central Intelligence Agency
The Central Intelligence AgencyThe Central Intelligence Agency
The Central Intelligence Agency
Oscar Gary, Jr.
 
The work-of-a-nation
The work-of-a-nationThe work-of-a-nation
The work-of-a-nation
https://www.cia.gov.com
 
Counterintelligence wikipedia
Counterintelligence   wikipediaCounterintelligence   wikipedia
Counterintelligence wikipedia
https://www.cia.gov.com
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
SaadiaFatima2
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
86402 factbook low
86402 factbook low86402 factbook low
86402 factbook low
https://www.cia.gov.com
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
Christina Berger
 
Facts and figures 031413
Facts and figures 031413Facts and figures 031413
Facts and figures 031413
antivladinforum
 
Secret Services
Secret ServicesSecret Services
Secret Services
Vacuumcleaner4
 

Similar to cia (14)

Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
Defense Against Terrorism
Defense Against TerrorismDefense Against Terrorism
Defense Against Terrorism
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
 
Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
 
The Central Intelligence Agency
The Central Intelligence AgencyThe Central Intelligence Agency
The Central Intelligence Agency
 
The work-of-a-nation
The work-of-a-nationThe work-of-a-nation
The work-of-a-nation
 
Counterintelligence wikipedia
Counterintelligence   wikipediaCounterintelligence   wikipedia
Counterintelligence wikipedia
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
86402 factbook low
86402 factbook low86402 factbook low
86402 factbook low
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Facts and figures 031413
Facts and figures 031413Facts and figures 031413
Facts and figures 031413
 
Secret Services
Secret ServicesSecret Services
Secret Services
 

Recently uploaded

Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 

Recently uploaded (20)

Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 

cia

  • 1. THE ROLE OF INTELLIGENCE AGENCIES ESPECIALLY THE CENTRAL INTELLIGENCE AGENCY (CIA) TO THE WORLD TAMMY CHIAM
  • 2. 1.0 INTRODUCTION Over the years, public views of the intelligence agencies and its role in foreign policy have been shaped primarily by movies, television, novels, newspapers, books by journalists, and essays by "experts" who either have never served in the intelligence agency, or have served and still not understood its role. There have many of intelligence agencies that set up by each country around the world.
  • 3.
  • 5.
  • 6. Institute for Intelligence and Special Operation
  • 7. Intelligence collecting and processing of that information about foreign countries and their agents which is needed by a government for its foreign policy and for national security, the conduct of non-attributable activities abroad to facilitate the implementation of foreign policy, and the protection of both process and product, as well as persons and organizations concerned with these, against unauthorized disclosure. secret action aimed at understanding or changing what goes on abroad. Intelligence agency refers to a government institution which collects, analyze and exploit valuable information and intelligence in support of law enforcement, national security, military and foreign policy objective and to lock the safety of nation.
  • 8. In Malaysia, we have Kor Risik Diraja, Malaysian Special Branch, Malaysian National Security Council, and National Security Division to combat terrorism for maintaining Malaysia’s security. CIA is the most prominent and familiar among other United States, then following by Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Defense Intelligence Agency (DIA). As the Cold War recedes into the past and a new world order emerges, it is important to understand why intelligence was centralized in the form it was. The attack on World Trade Center tower in New York and the Pentagon in Washington bring this question into very sharp focus.
  • 9. 2.0 BACKGROUND – THE HISTORY OF CIA The need for agency that world centralize intelligence gathering became obvious after the terrible tragedy of Pearl Harbor. Intelligence at the time had some idea that attack was possible but there was no single voice that dictated a loud enough to warning and to prevent it happen before it is too late. President Roosevelt appointed New York lawyer William Joseph Donovan to draft a plan for an intelligence service based on the M16 and SOE. After that, Donovan appointed as the Coordinator of Information on 11 July 1941. Office of Strategic Services (OSS) established by President Roosevelt on 13 June 1942 William Joseph Donovan became the head of the OSS in 1942. The OSS was a wartime intelligence agency and the forerunner to the CIA. It had a mandate to collect and analyze strategic information. The OSS supplied policymakers with facts and estimates but it never had jurisdiction over all foreign intelligence activities. conducting multiple activities and missions, including collecting intelligence by spying, performing acts of sabotage, waging propaganda war, organizing and coordinating anti-Nazi resistance groups in Europe, providing military training for anti-Japanese guerrilla movement in Asia, among other things.
  • 10. The OSS played a major role in training Kuomintang troops in China and Burma, helped arms, train and supply resistance movements from 1943 to 1945. During the World War II, one of the greatest accomplishments of the OSS was its penetrative of Nazi Germany by OSS operatives. After the Japan surrendered and closed the chapter of the Pacific Theater of Operations in the World War II, the OSS was abolished on 20 September 1945 by President Truman due to he signed Executive Order 9621. President Truman created the Central Intelligence Group (CIG) in January of 1946. President Truman signed the National Security Act of 1947 establishing the CIA on 26 July 1947 to make a fully functional intelligence office. CIA was formed to serve for two purposes that were to gather information about the capabilities and intentions of friendly and unfriendly nations and to evaluate it and present it in some useful form to policy-makers.
  • 11. 3.0 THE ROLE OF INTELLIGENCE AGENCY The on  the Pearl Harbor by the Japanese World Trade Center complex by the Islamic terrorist group al-Qaeda Paris -13 November 2015 **the rise of the Islamic State of Iraq and Syria (ISIS) The people need to protect by government agencies especially from the intelligence aspect. It helps to country to cope with security matters with gather the information that may include espionage, terrorism, arms trafficking and so on that related to nation’s security. ROLES  provision of analysis in areas relevant to national security  give early warning of impending crises, serve national and international crisis management by helping to discern the intentions of current or potential opponents  inform national defense planning and military operations  protect sensitive information secrets, both of their own sources and activities, and those of other state agencies.  collect the secret information that relating to the political and economic activities of foreign states such as assassination, arms trafficking, and the placement of misinformation …
  • 12. 1. Responsible for the collection and analysis of intelligence and its distribution to policymakers that were principally to the president, the National Security Council (NSC) and the Departments of State and Defense. 2. Charged with the conduct of covert action, the one area in which it implements policy. 3. Played out in the interaction, primarily in Washington, between the intelligence community and the policymaking community.
  • 13.
  • 14. 4.0 COMPARISONS BETWEEN THE CIA AND FBI not a law enforcement agency but an intelligence agency for espionage operations that was originally intended to only deal with foreign affairs had no authority to do any domestic "spying". has no authority to arrest anyone or to enforce any laws likes the FBI. It simply gathers information. works only in foreign matters. It is illegal for the CIA to investigate any United States citizen or company inside the United States, unless an investigation is part of a foreign intelligence. For example, the CIA may investigate an American who's suspected of being part of a terrorist plot being planned in a foreign country. domestic intelligence and law enforcement agency. does not work in foreign countries. As the investigative and enforcement arm of the United States Department of Justice, investigates the violations of federal criminal laws such as the possession and sale of illegal drug, cyber or computer-based crimes and Medicare fraud. has investigative and arrest powers anywhere in the United States where a federal criminal law is violated. CIA FBI
  • 15. The biggest difference between the FBI and CIA is the FBI’s nationwide reach. State and local law enforcement agents typically cannot enforce laws outside their specific jurisdiction, such as their state, county or city. Sometimes, the FBI also working hand-in-hand with the CIA when foreign-based plots land on United States soil when come to crimes, domestic or home-based terrorist activities, and other civil right violations.
  • 16. 5.0 CONCLUSION The intelligence agency is the first line of defense of the country as its eyes and ears. It helps the policymaker to understand and deal with the often dangerous world around us. An estimate after collecting the intelligence can provides a factual review of subject and forecasts future development. This also can prevent and stop the terrorism, danger, and war before it happens and led to the consequence that we cannot bear. This is done by trying to find out about plans to commit terrorism. United States has the finest global intelligence service in the world. The CIA’s assessment and research papers are the products of the largest intelligence analysis organization in the world. The intelligence’s work is not always the glamorous and exciting missions likes what we read about in books or see on the television shows and in the movie theater. Lastly, intelligence agency is needed in every country in the world to protect the country and the people from danger.