Progress Assignment
Human intelligence is obtained from humans. When using HUMINT, one can give out insight into specific information. Computers cannot offer insight, which is critical for any info. Through HUMINT, one can get information about any planned attack or any new weapon before they are dictated by technology. Moreover, HUMINT data collection is done openly when FBI agents are interviewing suspects or witnesses. Their data collection is also achieved through both covert and clandestine means. Unlike other intelligence, data collection within the HUMINT is entirely the responsibility of the FBI. Human intelligence plays a significant role in the development and implementation of national security and U.S. foreign in protecting the states’ interest. HUMINT resources within the NCS are tapped only when there is well placed physical asset to access the intelligence relevant to the military, policymakers, president, and other key participants of the intelligence community. HUMINT has resources that can present inherent risks to mortal lives. Its supplies can be preserved for other intelligence requirements that cannot be present in other existing intelligence collection methods. HUMINT provides both positive intelligence and information on substantial counterintelligence worth. It offers various kinds of information, such as observations during events from travelers or refugees and information on interest and interpersonal networks.
2
Covert action entails a specific country’s efforts to influence another country’s economic, political, and military position. For instance, the U.S. can change who becomes the president of Venezuela but not publicly acknowledging it. Clandestine, on the other hand, involves operations going on without the general public or the enemy forces knowledge. Overt HUMINT is done publicly by my diplomatic personnel and is one the oldest means of acquiring information from a foreign nation. This mode’s advantage is that one cannot be prosecuted if found guilty as one has diplomatic immunity. The disadvantage for overt is that sponsors of their activities must be prevented from disclosure, resulting in security threats or political embarrassment. Clandestine HUMINT is done secretly by an agent from a foreign country. For instance, a Russian political refuge can infiltrate a company based in the U.S. and be giving information personally to its state. The advantage of this mode of acquiring knowledge is that one gets information firsthand; thus, it is more reliable. Clandestine cases are rare as hence bearing a significant disadvantage since most of their agents come into the U.S. with the excuse of being political refugees. Once they secure a place within the united states, they can gather financial, political, or technical information needed by their governments.
A STUXNET is a malware that is specially created to cause harm to other individual’s computers. It is also a very refined computer that abuses various previously unrecognized windows vulnerability to contaminate computers and transmit the problem. After infecting a computer, STUXNET checks to ascertain if it is connected to other specific models from the Programmable Logic Controllers produced by Siemens. In the absence of Siemens, STUXNET becomes dominant within the computer. The malware focus point is the data acquisition system. It attacks the programmable logic controllers, which are vital for the automation of mechanical operations. Most of the machines getting attacked are those applying Microsoft Windows as their operating system. According to reports, the malware was responsible for attacking the nuclear program of Iran. STUXNET works in three stages. Firstly, the worm carries out the initial attack on a presented link file that disseminates the infection version. Lastly, there is a rootkit that ensures the worm is not detected. It is most likely that the worm can spread through USB flash drive hence degrading several other machines and computers. The primary aim of STUXNET is to target the Programmable Logic Controllers that are applied in automating the processes of a device. STUXNET is recognized as a feature rather than a bug, and they turned themselves off by killing their switch hence stopping their spread.
4
The open-source information involves collecting data from public sources, scrutinizing it, and applying for various intelligence purposes. Open-source information is divided into six categories. Firstly, there are media which consists of magazines, television, and newspapers. Secondly, there is economic data that entails financial and industrial databases. Thirdly is the internet, and an example is social media and blogs. Fourthly, there are professional and academic publications such as journals, theses, and dissertations. The fifth is the public government data, which entails all the government reports and websites. Lastly, there is grey literature, which consists of business documents, patents. Firstly, information reliability is one major hindrance to using OSINT. Not all the information in magazines or the media is accurate. Secondly, there is also a large pool of data to be looked at; thus, it is easy for overlooked information. Moreover, some analysts cannot use the internet. Fourthly when one uses the internet to find information and does not find it, he might stop looking for it altogether. The information within the OSINT is exposed to cybercriminals hence being potential to the various malicious application of the data. Therefore, OSINT is a goldmine to individuals interested in breaking into one’s I.T. system. To minimize on attack surface, individuals should ensure that they do not have vulnerable actions running on their computers.
5
One of the significant limitations of COMINT occurred when the two parties were communicating are using codes to communicate. The message can also be encrypted thus cannot be understood by a third party. Secondly, one party can also decide to give out false or misleading information. Therefore any action taken because of the information will be wrong. COMINT requires that everything is laid out, reviewed, and planned appropriately. Most individuals participating in interviews do not give accurate details, especially on individuals deliberated as enemies. Many receiving individuals end up getting deceived. As a result, many delays are encountered in processing information as most time is wasted on differentiating between facts and fiction. COMINT also has a diminished utility. Consumer’s ability to use COMINT is highly limited due to prevalent security considerations. Many personnel such as intelligence analysts, military commanders, and government officials do not believe in COMINT information received. This is because many readers do not understand or trust their sources’ dependability, and they do not tend to fit into the already existing notion of the readers. They end up being ignored and misused. Lastly, many military commanders and intelligence officials are over-reliant on COMINT hence excluding the other bases of intelligence information.