intelligence

16
Phase 4IP HLS630: Organizational and Policy Challenges 1503B-01 Colorado Technical University On-Line Melissa Hall Professor Suzanne Swab September 14, 2015

Upload: melissa-aintgonnanevermissem-carroll-hall

Post on 10-Dec-2015

2 views

Category:

Documents


0 download

DESCRIPTION

describing the intelligence

TRANSCRIPT

Phase 4IP

HLS630: Organizational and Policy

Challenges

1503B-01

Colorado Technical University On-Line

Melissa Hall

Professor Suzanne Swab

September 14, 2015

 

 

To successfully start intelligence work, an knowledge of the strategic intelligence plan is a must. 

NSA Pros

Electronically sharing collected data securely, while making sense of it.

Increase noticeably the security of national security systems.

Increases vital operations and data when and where required.

Pros Continued

1. “Offering the least principles for creating and overseeing an intelligence function

2. Providing rules for safeguarding confidentiality and constitutional rights inside

the intelligence procedure.

3. Offering typical rules and procedures for applying or evaluating the intelligence

function of the agency.

Cons of NSA

Any conversation regarding the NSA’s surveillance and data collection practices

could very well disclose state secrets.

Cons Continued…

1. “The challenge of the National Criminal Intelligence Sharing Plan is aligning

policies to leverage the existing systems; each system needs to overcome policy barriers and

technology barriers so they can leverage their assets” (Michael, 2003).

There are two main functions of the NSA: defending the

information systems of The U.S. government by utilizing code

making and changing secret, foreign intelligence communication

into thorough text (Levy,2011).

Information is a global currency that can alter how countries function

The disclosed secrets regarding the NSA’s program PRISM, NSA call database and vast Informant, promptly caught the attention of the public.

The Director, National Security Agency will:- Assess and consent all cryptographic implementations

envisioned to safeguard national security systems and/or national security data.

Offers both guidance and assistance to U.S. Government Departments, to include agencies ,with classifying defense necessities and choosing the encryption algorithms and product implementations.

Offers any endorsements for developments to the overarching objectives and aspirations or key polices of the strategy

Provide recommendations for implementation.The National Security Agency has long been involved with the computer security research community in examining a broad range of computer security subjects to include operating system security, as part of its data or information assurance mission.

The National Security Agency has long been involved with the computer security research community in examining a broad range of computer security, as part of its Information Assurance purpose.

The security mechanisms implemented in the system provide flexible support for a wide range of security policies. They make it possible to configure the system to meet a wide range of security requirements.

NSA is subject to rigorous internal compliance and external oversight. Like many other regulated entities, NSA has an enterprise-wide compliance program, led by NSA's Director of Compliance, a position required by statute. NSA's compliance program is designed to provide precision in NSA's activities to ensure that they are consistently conducted in accordance with law and procedure

References

About NSA. (n.d.). Retrieved from https://www.nsa.gov/about/commitment/index.shtml

Levy, A. (2011, May 11). An Overview of the Major U.S. Intelligence Agencies: What is the Difference Between the DIA, NSA, CIA and FBI? Retrieved from http://angelialevy.com/2011/05/11/ an-overview-of-the-major-u-s-intelligence-agencies-what-is-the-difference-between-the-dia-nsa-cia-and-fbi/

Ludloff, M. (2013, July 19). Privacy v Security, Transparency v Secrecy: The NSA, PRISM, and the Release of Classified Documents. Retrieved from http://blog.patternbuilders.com/2013/07/19/ privacy-v-security-transparency-v-secrecy-nsa-prism-others/

Michael, S. (2003, December 1). Intelligence officials call for info-sharing organization.

National Security Agency, Civil Liberties and Privacy Office Report. (2014, April 16). Retrieved from http://fas.org/irp/nsa/clpo-702.pdf

Security-Enhanced LinuxSecurity-Enhanced Linux. (n.d.). Retrieved from https://www.nsa.gov/research/ selinux/index.shtml

The Comprehensive National Cybersecurity Initiative. (n.d.). Retrieved from https://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative