Covert action is an operation, planned and executed while concealing the source of permit of the operation. The operations are usually set up with an intention of creating a political effect which affects the military intelligence or the law implementation grounds affecting the either the internal or the external population of a country (Morgan, Glyn, Linda Carter & David 170). In the United States, the Central Intelligence Agency (CIA) is the only agency allowed by the law to conduct covert action unless the president appoints another agency to do so. In todays world, however, it is very hard to carry out such secretive operations mainly because of the revolution of internet and social networks. There are organizations founded specifically with the intention of discovering secret government operations and sharing the information with the public. An example of such organizations is the famously-known Wikileaks.
Wikileaks is a non-profit media organization founded to leak important information to the public by finding innovative and secure ways of tapping into the sources of such information (Welk, Allaire, Christopher & Mayhorn 8). The organization mainly attempts to create transparency between the government and the public which reduces the rate of corruption and strengthens democracy in all government institutions. The organization applies modern technological equipment such as the internet and cryptography to acquire the information which is then verified before releasing it to the public. The organization has uncovered various corruption and military scandals in the country. However, such organizations should only concentrate on corruption cases since most covert actions in the military are usually for the good of the country (Clark & Robert 18). The government may send some of the intelligence officers as spies to info trade terrorism organizations to find easier ways of dealing with terror attacks. Uncovering such secret information and relaying it publicly may lead to the death of the officers.
According to Sherman Kent, an intelligence service ought to serve as the defender of a nations ideals. The ideology is appropriate since every nation relies on its intelligence service to protect the country from a viable threat before it happens (Seaver & Brenda 528). The intelligence service personnel undergo a training program that specifically trains them on disaster management before it takes place and in a worst case scenario, to give their lives for their country. They are not allowed under any circumstance to give crucial information about the country to the enemy according to their training (Morgan, Glyn, Linda, Carter & David 120). The ideology is also appropriate because most of the recruited persons in the intelligence service have a passion for serving the country and swears to serve the country from external and internal threats. In addition to that, sacrificing oneself for the good of many is a perfect representation of ones loyalty to ones country.
There is need to consolidate the many intelligence analysis agencies under the Department of Homeland Security to enhance unity among the agencies. The agencies are currently experiencing coordination problems as each agency attempts to outdo the other (Gentry & John 177). For example, the 9/11 incident would have been avoided if the agencies had worked together to see the potential threat. Consolidating and merging the agencies will be a big step in making the intelligence service more agile as it will lead to the reduction of redundancies in the system. The new system will make the role of the Director of National Intelligence an effective leadership position more effective in the Department of Justice (Seaver & Brenda 529). The new system should, however, introduce subordinates to help with administration for effective results. This is because the task of managing the merged agencies cannot be effectively handled by an individual.
Clark, Robert M. Intelligence analysis: a target-centric approach. CQ press, 2016.
Gentry, John A. "Andrew MarshallIntelligence Analyst and Much More." (2016): 170-178.
Morgan, Glyn, Linda Carter, and David P. Briand. "An interview with Glyn Morgan, Intelligence Analyst, ICTY (1995-2001), for the Ad Hoc Tribunals Oral History Project." (2015).
Seaver, Brenda. "From the Ivory Tower to the CIA: Reflections from a Career Intelligence Analyst." PS: Political Science & Politics 49.03 (2016): 527-530.
Welk, Allaire K., and Christopher B. Mayhorn. "All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst task." Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. ACM, 2015.
If you are the original author of this essay and no longer wish to have it published on the SuperbGrade website, please click below to request its removal:
- The Earth's Protective Shield: Shielding Design Project
- Henrik Ibsen a Dolls House: Critical Study
- Literature Review of New ATP 3 Cholesterol Guidelines
- Paper Example on Unilever Principles of Marketing
- The Features of Classical Racialism
- Technology: Blessing or Burden
- What Can Google Do to Protect Peoples Privacy?
- Essay Sample on Essential Business Aspects
- Power and Corruption in George Orwells Animal Farm
- How Cybercrimes Happen
- Starbucks 2014 Annual Report
- Casey Sheahan, a Former C.E.O of Patagonia Inc