Technology to Address Challenges for Intelligence Agencies Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

After the terrorist attacks directed towards the United States on September 11, 2001, intelligence agencies shifted their attention to sealing hidden weaknesses in the existing defense measures. Over the years, there have been increased attempts to analyze security weaknesses and develop strategies to deal with emerging challenges. This has led to the establishment of research units in order to understand existing or future security threats to the United States.

Apparently, terrorist adversaries have been remarkably helpful in the search for potential emerging trends (Jackson and Frelinger 2). With the Internet available to be used by everyone without major restrictions, many people are today involved in helping the government address issues of security threats with or without their knowledge. Using sophisticated mechanisms, it is possible for security experts attached to different intelligence agencies to track information and understand possible approaches that may be used by terrorists.

Generally, the task requires intelligence agencies to establish the various avenues that may be used for terrorist attacks including buildings, means of transport, or information technology. Apparently, almost anything today can be used to create extremely dangerous weapons. In addition, people associated with terror groups also provide make critical information available for intelligence agencies.

By participating in forums organized by the terrorists, supporters share their thoughts and get to opportunities to know the other option available. When this information is exchanged via the Internet, it eventually becomes available to intelligence agencies.

Clearly, the act of sharing information back and forth among the supporters of the terror gangs enable members of the intelligence teams to quickly become aware of other possible forms of attack. Through their own investigation processes, intelligence agencies also discover and add on to what is collected from communication activities of terrorists. Although many of the operations detected during such activities are less operational, they provide a constant stream of novel potential attacks to challenge security planners.

The media also serves as a useful channel for discovering how the terrorists carry out their operations. Through newspapers, television, and other forms of media, information regarding the operations of terrorist groups is exposed to the public.

Intelligence agencies can the take advantage of the media activities to enrich their knowledge of terrorist activities and prepare to counter their illegal activities. The information gathered can be well documented and can be of help in future preparations of the intelligence teams to deal with security threats.

It is, however, important to note that as security professionals continue to work hard to understand the mind of the terrorists and how they plan and execute their operations, new ways of concealing terror acts are being discovered almost every day. Although technologies exist to secure communication through the Internet, other emerging technologies are also available to compromise security on the Internet.

Military Operations of the Future

According to Graham, military operations of the future will be predicted on information dominance (29). Emerging technology enables the rapid collection, processing, and dissemination of an increasing volume of highly accurate strategic, operational, and tactical information.

Much of this information comes from reconnaissance, surveillance, and intelligence assets in air and space but the national and international information infrastructure are of benefit as well. Beyond doubt, control of the information spectrum will be pivotal to the outcome of conflict in the twenty first century. It will involve not only the preservation of access to such information but also the denying of access to adversaries.

The armed forces are vitally dependent on space systems for information, communications, and operational support that range from targeting assistance to weather reporting. It is clear that space will feature even more in defense programs and strategies of the future. As noted by Graham, the Air Force launches and operates more than ninety per cent of all Department of Defense space assets (30). The Air Force has also been designated as the Department of Defense executive agent for multi user space systems.

The increasing importance of the military space program is such that it must be accorded priority in research, development, and funding by the Department of Defense and by the nation. Leading requirements include routine, affordable, reliable access to space and better systems to detect and track theater ballistic missile launches.

On recognizing the need to boost the security in the United States, President Clinton directed his government to ensure that intelligence agencies integrated technology in their operations. This move was meant to improve security both in the United States and globally in the face of a fast changing security environment and emerging threats to national and international security. Support for this was later provided through increased budgetary allocations for the operations of intelligence agencies.

According to NRC, there are numerous technologies in the global market today that hinder the ability of intelligence agencies to relay their communications in a more secure manner (32). A quick scan of the market will, therefore, reveal many other security challenges in the global arena.

Throughout the world, there have been various attempts to come up with technologies that are dependant as far as dealing with national and international security is concerned. In the Middle East, for example, efforts were made to develop nuclear capability for internal use to enhance security.

Another development that has been regarded as dangerous is the return of foreigners to their countries after staying in the United States for a considerable amount of time. It is presumed that such people could have decide to return home after gathering information about the United States that will later be used to launch terrorist activities in the country.

Silence is another silent threat that nations must be concerned about. Although often missed out, intelligence agencies must create time to understand the implications of silence. Despite the fact that people may be silent, it is possible that this can be an attempt to protect their secrets and hide their intentions from their intended targets (Khosrowpour 10).

Intelligence and Technology in the Face of Emerging Security Threats

From the preceding discussion, intelligence agencies have to work extremely hard to integrate technology in their operations. As attackers are constantly seeking more efficient ways to launch their attacks, it is vital for the intelligence team to keep abreast through research and new discoveries.

According to NRC, technology is responsible for creating tremendous changes in the society because of their availability everywhere (29). An obvious need for the use of technology to deal with security concerns may be linked to the fact that they include sensors which are today used widely in a number of key operations across the world. Besides being used by the military, sensors are also used for many commercial services.

The use of the radio frequency identification tags is an example that has received so much recognition globally. Although modern technology is far much better than the technology of yester years, what is available today borrows heavily from past technology. Beyond doubt, previous technologies offered a very strong foundation for the technology of today (Khosrowpour 13). Apparently most of these technologies had their beginnings in the United States supported by the Department of Defense.

In the present world, one can not fail to notice the contribution of technology to the state of security throughout the world. There are many benefits that have so far been realized through the use of technology as far as managing security is concerned. As we move into the future, technology will continue to take a central position in the management of national and international security.

Technology and Intelligence

Led by the United States, many nations have now recognized the importance of integrating technology in intelligence operations. As the United States continues to allocate more resources for enhancing its national security, other countries are also following suit but a slower pace.

For the United States, investment insecurity is driven by the desire to protect its citizens and to become a model for other nations to emulate. Due to its increased spending on security, the United States is now able to take pride in its improved level of security. Unlike in the past, intelligence agencies are forced to utilize technology to undertake numerous activities geared towards strengthening the country’s security.

Despite being very sensitive area, technological advances regarding matters of security are often discussed openly. These include developments in cryptology as well as computer security that are very critical to the subject of security. Secure Hash Algorithm (SHA) is major security technology that has been used quite extensively over the years.

Though considered very secure, the standard is slowly being replaced by other modern technologies with improved features. On the other hand, however, it is almost impossible to understand how strong the government’s intention to use these technologies is since this information is never made available to the general public.

Considering the emerging trend of threats, it is important to think about the software being used, the type of hardware, and to incorporate other technologies such as supercomputing, and use of communications systems. These are explained as follows.

Software

In any system today, software plays a major role. To achieve the best results, software designers must ensure that the software is developed in a way that can easily integrate with the desired security systems. Those who are more adept at designing, implementing, and operating large complex, software based systems will be at a distinct advantage twenty first century operations that are increasingly dependent on information superiority (Duyan 30). Poor software slows down the impressive gains made to date in computer hardware.

As part of their duties, intelligence agencies should monitor the development of software to ensure that designs meet the required standards. This is exercise is especially important considering that many countries today are in the business of software development and they may be using different standards. Close monitoring is, therefore, necessary to guarantee quality. Without close supervision, designers can easily get a way with poor quality products that do not meet the set standards.

The use of modern programming languages and techniques should be encouraged in order to factor in vital features that are required to produce reliable and extremely secure software.

As new technologies continue to emerge, it is important to check that the design of software is able to offer support for thee technologies. It would certainly be wrong for a software developer to come up with any product that fails to accommodate existing technologies. The existence of wireless technologies and the coming of cloud computing and any other newer technologies must be thought about during the design process.

Hardware

Similar to software, it is important to think about the quality of hardware to be used to support the different security services that must be offered. To a large extent, the nature of technology to be used by the intelligence agencies must meet the required standard. The use of less superior hardware platforms will greatly compromise the performance of the security systems and create serious problems for the intelligence teams.

A good practice is to liaise with the design team to ensure that the hardware acquired will yield the expected results. Generally, the advice received from the software developers is critical to ensuring that whatever is provided will perform as expected.

In cases where the client has gone ahead to procure hardware without receiving professional advice from developers, the outcome has been quite disastrous and huge sums of money have been lost in the process. It is, therefore, prudent to take all the necessary precautions in order to avert disappointments later.

Supercomputing

In the recent past, a lot of interest has been generated about super computers. These computers have become the vocabulary of all educated persons throughout the world. Generally, supercomputers are the fastest and most expensive computers available at any given time. Although the cost of computers has been going down over the years, the cost of supercomputers has remained fairly steady.

Given the requirements for security, intelligence agencies must never compromise on the quality of computer to be used. With its high speed of execution and power a super computer offers the best environment for managing security threats. Supercomputing should therefore be encouraged in order to protect a nation and its citizens. Despite the fact that it is a very expensive computer to acquire, its services are equally admirable.

Although the Internet presents us with great opportunities for communication, it also comes along with serious challenges that must be handled effectively. One of the greatest challenges of using the Internet is the danger of ones communication being tapped into (Duyan 35). Despite the fact that various technologies have been developed to address the problem of Internet security, attackers are still able to go round the system and do as they please. This includes planning of terror attacks.

Conclusion

The ability to use technology to address challenges posed by emerging security threats globally is critical for intelligence agencies. Since offenders are often looking for new and more complex ways to launch attacks, intelligence agencies must work extra hard to come up with mechanisms of ensuring that criminals do not outsmart them.

It is imperative for governments to equip intelligence agencies with the necessary tools to support their research activities and to build more secure systems that can not be easily be compromised.

Works Cited

Duyan, Adil. Defense against Terrorism: Different Dimensions and Trends of an Emerging Threat, Kabul, Afghanistan: IOS Press, 2012. Print.

Graham, Joseph. What the U. S. Military Can Do to Defeat Terrorism, Lincoln, NE: iUniverse, 2002. Print.

Jackson, Brian, and David Frelinger. Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About, Arlington, VA: Rand Corporation, 2009. Print.

Khosrowpour, Mehdi. Emerging Trends and Challenges in Information Technology Management, Hershey, PA: Idea Group Inc, 2006. Print.

National Research Council (NRC). Avoiding Surprise in an Era of Global Technology Advances, Washington, DC: National Academies Press, 2005. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, April 17). Technology to Address Challenges for Intelligence Agencies. https://ivypanda.com/essays/technology-to-address-challenges-for-intelligence-agencies/

Work Cited

"Technology to Address Challenges for Intelligence Agencies." IvyPanda, 17 Apr. 2019, ivypanda.com/essays/technology-to-address-challenges-for-intelligence-agencies/.

References

IvyPanda. (2019) 'Technology to Address Challenges for Intelligence Agencies'. 17 April.

References

IvyPanda. 2019. "Technology to Address Challenges for Intelligence Agencies." April 17, 2019. https://ivypanda.com/essays/technology-to-address-challenges-for-intelligence-agencies/.

1. IvyPanda. "Technology to Address Challenges for Intelligence Agencies." April 17, 2019. https://ivypanda.com/essays/technology-to-address-challenges-for-intelligence-agencies/.


Bibliography


IvyPanda. "Technology to Address Challenges for Intelligence Agencies." April 17, 2019. https://ivypanda.com/essays/technology-to-address-challenges-for-intelligence-agencies/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1