Angela Nixon
HLSS320: Intelligence and Homeland Security
March 13, 2016
ISIS, which stands for The Islamic State in Iraq and Syria, has become one of the largest threats to the United States. In addition, it has become a terrorist organization that exploits various sources of intelligence collection methods to include open source intelligence (OSINT), human intelligence (HUMINT), imagery intelligence (IMINT) and signals intelligence (SIGINT). Each of these intelligence methods provide ISIS with many ways to expand, but recruitment through open source intelligence is the most valuable to ISIS.
ISIS has used social media to recruit new members and to intimidate on a massive scale. ISIS …show more content…
The United States is able to conduct SIGINT against ISIS operatives and gather further intelligence on their organization, as well as preventing some of their operations using coalition forces. A new method that could provide even more ammunition and protection against ISIS is called Cyber Security. Using military level CYBERCOM operations, the United States can discover and exploit any internet operations that are being conducted by ISIS. This method also relies on the intelligence gathered by open source analysts to find websites, IP addresses, locations of interest, and any networks and computer systems being used by ISIS. “The terror group has five to six members offering 24-hour support on how to encrypt communications, hide personal details and use apps like Twitter while avoiding surveillance” (Fink, et al., …show more content…
In the Red Team analysis technique, the analyst must think like a member of the organization and predict possible outcomes based on the intelligence gathered. ISIS is somewhat predictable in what is going to be the next move, but just not where. The Carver Threat Analysis is also a useful technique in that it requires analysts to predict likely targets based on criticality, accessibility, recoverability, vulnerability, effect and recognizability (Heur 1999). The most effective strategy is the Carver Threat analysis as it takes into consideration more intelligence and predicts specifics based on the above criteria. Other techniques such as the Team A/Team B and the Devil’s Advocate may be beneficial as they put analysts against each other but are not as valuable as the Red Team or the Carver Threat