SlideShare uma empresa Scribd logo
1 de 8
Denial & Deception – Week 7
Select
one
of the ‘Questions to Ponder’ as your topic for this week's
Forum posting. Original post must be 250+ words. Student
responses must be 150+ words.
Questions to Ponder
Who are the world's leading practitioners of Denial and
Deception? How have they developed, or acquired their
capabilities? Do they share their capabilities, and if so, with
whom?
What is the influence of the twenty-four hour news cycle and
the internet in Denial and Deception?
What role are private companies playing in Denial and
Deception proliferation and sophistication?
What does the future hold for Denial and Deception operations?
Student Response #1 – Harshul
Who are the world's leading practitioners of Denial and
Deception; How have they developed, or acquired their
capabilities; Do they share their capabilities, and if so, with
whom;
China and Iran are the world's leading practitioners of
Denial and Deception. In true Cold War fashion the PRC
continues to mislead the international community about its arms
build up and its geo-strategic goals in the Far East and South
East Asia. Tactically, through the use of conventional forms of
deception and “...electronic decoys, infrared decoys, false-target
generators and angle reflectors” (Gertz 2008, np) during
operations and testing procedures the Chinese have prevented
others from gaining insight into their capabilities and
intentions. Strategically, as it grows stronger the PRC aims to
use all available means to settle territory related disputes with
Vietnam, Philippines, Taiwan and Japan. Along with their own
ingenuity and skill the most important sources for technological
tools of deception and denial have come from business
transactions with Russia and outright theft from the United
States. It has also acquired American technology through our
allies such as Israel. China has shared its capabilities with
Pakistan, Iran, Syria and North Korea.
Iran has certainly practices both functions in order to hide
the progress or lack there of concerning its nuclear ambitions. It
has also practiced deception in order to intimidate its neighbors
and the United States. In 2006 the Iranians had released a video
of an allegedly successful missile test to showcase their military
capability but after careful analysis “...U.S. intelligence officers
analyzed the plume of smoke from the missile and determined it
matched a video of an earlier Chinese test” (Barnes 2006, np).
The Iranians have developed much of their capabilities with
help from China and North Korea and have shred their
capabilities with their allies in the region, mainly Syria and
Lebanon.
References
1. Gertz, Bill. 2008. Denial and Deception. Inside the Ring. The
Washington Times, March 28,
http://www.washingtontimes.com/news/2008/mar/28/inside-the-
ring-60000234/?page=all (accessed October 24, 2014)
2. Barnes, Julian, E. 2006. Video of Iranian Missile Test Is
Fake, Pentagon Says. Los Angeles Times, September 10,
http://articles.latimes.com/2006/sep/10/world/fg-missile10
(accessed October 24, 2014)
Student Response #2 – Bobby
Who are the world's leading practitioners of Denial and
Deception? How have they developed, or acquired their
capabilities? Do they share their capabilities, and if so, with
whom?
The Iranian government has been great at conducting denial and
deception over the years. In an article written by Mike Nizza
suggested that a photo showing a launch of four missiles was
actually only three had launched (Nizza and Lyons 2008). The
image was released by Sepah News, which is the media wing of
the Iran’s Revolutionary Guard and was mostly doctored up
with photo shop.
There are many cases where Iran is hiding the real and showing
the fake. For example, Iran’s nuclear program continually
states their program is designed for electricity generation versus
nuclear weapon (Reporter 2011). Then why do they need the
so many centrifuge machines running, according to an article in
The New York Times, the Iranians have 19,000 and 10,200 are
operating (Board 2014). For Iran, acquiring a nuclear weapon
is a matter of national pride and to project power in the region.
Another case is the denial and deception that took place at
Parchin. According to Maseh Zarif, the regime did not allow
inspectors from the International Atomic Energy Agency
(IAEA) access (Zarif 2012). By not gaining entry, this provides
miss leading information and IAEA cannot make an accurate
assessment of their nuclear program.
So now that we have an understanding of how Iran is able to use
D&D to continue with their weapons program let us examine
where they are acquiring their technology. There is numerous
sources of information in relation to the relationship that Iran
has with both, China and Russia. They are both fully capable
countries that could provide growth in the Iranian uranium
enrichment program or provide items that are needed to the
continual development.
Another tactic currently being employed by Iran is the stand
back and let the situation in Iraq fester. The diversion going on
in Iraq, Syria, and the Ukraine puts Iran on the back burner so
the rest of the world are focused on other hot spots. The
deteriorating situation in Iraq also provides an environment
where the US and Iran have some common ground against an
enemy known as ISIS (Nader 2014). By the US and Iran
working together provides another opportunity for Iran to
negotiate terms on an agreement. The only country really
concerned with Iran is Israel because Iran still makes harsh
statements against them about their ultimate destruction in the
region.
There are numerous concerns on about Iran gaining nuclear
weapons within the region because this would lead to great
instability. Additionally, this would create an offset of power
and could lead to further escalation in an area that has already
been having problems.
Bibliography:
Board, Editorial. "Impasse Over Iran’s Nuclear Program."
The New York Times
, 09 2014.
Nader, Alireza. "Why Iran Can't Walk Away from Nuclear Talks
So Easily."
RAND Analysis
, 09 2014.
Nizza, Mike, and Patrick J. Lyons. "In an Iranian Image, a
Missile Too Many."
The Lede
, 07 2008.
Reporter. "Blast Kills Commander at Iran Base."
The New York Times
, 11 2011.
Zarif, Maseh. "Iran's Denial and Deception at Parchin."
Iran Tracker
, 07 2012.
OSINT – Week 7
For this forum, you are to answer
one or more
of the questions listed below. The original post must be a
minimum of 250 words.
Questions:
1. Detail what the United States government is doing in support
of open source intelligence.
2. Describe the main elements of the OSINT strategy of the
United States.
Why would the government baulk at hiring private
organizations/companies to collect OSINT?
3. Assert and defend an appropriate role for the government in
facilitating the use of OSINT at an international level. Is it
different than the use of OSINT at a Federal, state, or municipal
level? Give examples to support your position.
Student Response #1 – Dwayne
Why would the government baulk at hiring private
organizations/companies to collect OSINT?
The changes that followed 9/11 were dramatic for the
Intelligence Community (IC). Part of the many restructuring
processes that took place was the development of the Office of
the Director of National Intelligence (ODNI). Under the
umbrella of the ODNI, both intelligence agencies and their
civilian counterparts, the contractors, where brought together.
The IC has a budget exceeding $44 billion dollars. Many are
surprised by the fact that around half of that sum is paid out to
contractors and private companies. Even with that expenditure,
there are times when the government is hesitant to hire those
firms.
One major drawback of the use of contractors in OSINT
processes is they often lack the rigid boundaries of “tradecraft”
that are so well established for government employees.
Contractors, at times, have the freedom to make analytical
judgments without references to certain source material. While
this may be acceptable for a private client, it does not suit
policy makers well. The judgments without sources can create
conflict or tension because of the trade off that occurs between
information efficiency and information quality.
Information quality is the primary concern for
government agencies, as their intelligence is meant to support
policy level decisions, and those decisions must be based off of
traceable sources for accountability purposes. While the lack of
sources does not necessarily indicate bad intelligence, policy
makers are accountable for their choices, so their choices must
be based off of intelligence that can be audited.
On the flip side of the coin, information efficiency is a
major factor in the private sector intelligence contractors. They
often have rigid deadlines that must be met in order to honor
their contract, and as a result, may be forced to rely more on an
analysts professional judgment and less on establishing and
organizing the source material for others to reference.
Resources
Bean, H. 2006.
Tradecraft versus science: Intelligence analysis and outsourcing
. Retrieved from
https://edge.apus.edu/access/content/group/security-and-global-
studies-
common/Intelligence%20Studies/INTL%20422/Content/Week%
207/Outsourcing%20OSINT_Bean.pdf
Student Response #2 – Sammy
Why would the government baulk at hiring private
organizations/companies to collect OSINT?
Open Source Intelligence (OSINT) is defined as the collections,
exploitation, analysis, and dissemination of publically available
material to answer an intelligence requirement. For OSINT to
become effective and useful, there should be a close
relationship between the consumer and the producer. General
Michael Hyden, Director of the CIA indicated that “while
OSINT may be unclassified, out interest in it is no” (Crowe &
Davidson). For OSINT to become effective, the interest of the
customer must be clear to the producer, otherwise, products will
be of little or no use to the customer. Most OSINT is being
produced by contractors, who may not hold a security clearance
precluding them from knowing who the customer is or become
privy to the real interest for asking for this information (Crowe
& Davidson). For example, Open Source Center (OSC) was
established by the Director of National Intelligence (DNI) and
managed by the CIA. Contractors working for OSC are fully
aware of their prime customer and understand that the products
are consumed, mainly, by their executive agency. Since the
correlation between OSC and the CIA is a public knowledge,
anyone providing OSINT to OSC can deduce why the CIA
would be interested in this type of reporting which may be
classified information. Additionally, contractors may use
software applications used by commercial vendors to sift
through and generate their intelligence reporting. There is
always a risk when a contractor uses another commercial
product because of biases to promote or demote another
contractor’s product which may skew their objectivity in
generating OSINT reports. One more drawback is the
framework private agencies give their analysts to generate
products. Private firms operate for profitability, thus analysts
must abide by special format, word count, deadline, and a very
narrow set of rules without knowing the larger context (Bean,
2006).
References:
Bean, H. 2006. Tradecraft versus science: Intelligence analysis
and outsourcing. Retrieved from
https://edge.apus.edu/access/content/group/security-and-global-
studies-
common/Intelligence%20Studies/INTL%20422/Content/Week%
207/Outsourcing%20OSINT_Bean.pdf
Crowe, June, and Tomas Davidson. Accessed November 16,
2014. https://edge.apus.edu/access/content/group/security-and-
global-studies-
common/Intelligence%20Studies/INTL%20422/Content/Week%
207/THE%20%E2%80%9CGREY%E2%80%9D%20INTERSECT
ION%20OF%20OPEN%20SOURCE%20INFORMATION%20A
ND%20INTELLIGENCE.pdf.

Mais conteúdo relacionado

Semelhante a Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx

Gao Protest Vs. Agency-Level Protest
Gao Protest Vs. Agency-Level ProtestGao Protest Vs. Agency-Level Protest
Gao Protest Vs. Agency-Level Protest
Katy Allen
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
archiejones4
 
Jeremy CastellanosBased on the articles assigned this week, .docx
Jeremy CastellanosBased on the articles assigned this week, .docxJeremy CastellanosBased on the articles assigned this week, .docx
Jeremy CastellanosBased on the articles assigned this week, .docx
christiandean12115
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
Chikere Uchegbu
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
Thomas Ewert
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
aryan532920
 

Semelhante a Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx (12)

Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Gao Protest Vs. Agency-Level Protest
Gao Protest Vs. Agency-Level ProtestGao Protest Vs. Agency-Level Protest
Gao Protest Vs. Agency-Level Protest
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
 
Jeremy CastellanosBased on the articles assigned this week, .docx
Jeremy CastellanosBased on the articles assigned this week, .docxJeremy CastellanosBased on the articles assigned this week, .docx
Jeremy CastellanosBased on the articles assigned this week, .docx
 
Antarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractionsAntarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractions
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
Disinformation post report-eng
Disinformation post report-engDisinformation post report-eng
Disinformation post report-eng
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 
Background Information Essay
Background Information EssayBackground Information Essay
Background Information Essay
 

Mais de ruthannemcmullen

Demonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docxDemonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docx
ruthannemcmullen
 
Dental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docxDental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docx
ruthannemcmullen
 
Democracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docxDemocracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docx
ruthannemcmullen
 
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docxDeliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
ruthannemcmullen
 
Deliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docxDeliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docx
ruthannemcmullen
 

Mais de ruthannemcmullen (20)

Describe how an attacker could use a sniffer in conjunction with a T.docx
Describe how an attacker could use a sniffer in conjunction with a T.docxDescribe how an attacker could use a sniffer in conjunction with a T.docx
Describe how an attacker could use a sniffer in conjunction with a T.docx
 
Describe a specific workplace conflict situation involving the compe.docx
Describe a specific workplace conflict situation involving the compe.docxDescribe a specific workplace conflict situation involving the compe.docx
Describe a specific workplace conflict situation involving the compe.docx
 
Describe common biases in decision making.Explain the roles of emo.docx
Describe common biases in decision making.Explain the roles of emo.docxDescribe common biases in decision making.Explain the roles of emo.docx
Describe common biases in decision making.Explain the roles of emo.docx
 
Describe an example of a television program that you believe clearly.docx
Describe an example of a television program that you believe clearly.docxDescribe an example of a television program that you believe clearly.docx
Describe an example of a television program that you believe clearly.docx
 
Describe Abell’s three-dimensional business-definition model and exp.docx
Describe Abell’s three-dimensional business-definition model and exp.docxDescribe Abell’s three-dimensional business-definition model and exp.docx
Describe Abell’s three-dimensional business-definition model and exp.docx
 
Describe an example of a contract that you or someone you know enter.docx
Describe an example of a contract that you or someone you know enter.docxDescribe an example of a contract that you or someone you know enter.docx
Describe an example of a contract that you or someone you know enter.docx
 
Denial-of-service attacks are a common method to bring down an organ.docx
Denial-of-service attacks are a common method to bring down an organ.docxDenial-of-service attacks are a common method to bring down an organ.docx
Denial-of-service attacks are a common method to bring down an organ.docx
 
Demonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docxDemonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docx
 
Describe at least five ways IT has helped change HR. What are the .docx
Describe at least five ways IT has helped change HR. What are the .docxDescribe at least five ways IT has helped change HR. What are the .docx
Describe at least five ways IT has helped change HR. What are the .docx
 
Dental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docxDental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docx
 
Democracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docxDemocracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docx
 
Deliverable Length  500-750 wordsOutline the major theories of .docx
Deliverable Length  500-750 wordsOutline the major theories of .docxDeliverable Length  500-750 wordsOutline the major theories of .docx
Deliverable Length  500-750 wordsOutline the major theories of .docx
 
Deliverable Length  A one-page letter to employeesLetter to E.docx
Deliverable Length  A one-page letter to employeesLetter to E.docxDeliverable Length  A one-page letter to employeesLetter to E.docx
Deliverable Length  A one-page letter to employeesLetter to E.docx
 
Deliverable Length  400 - 600 wordsSummative Discussion Boa.docx
Deliverable Length  400 - 600 wordsSummative Discussion Boa.docxDeliverable Length  400 - 600 wordsSummative Discussion Boa.docx
Deliverable Length  400 - 600 wordsSummative Discussion Boa.docx
 
Deliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docx
Deliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docxDeliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docx
Deliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docx
 
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docxDeliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
 
Deliverable Length  5 slides (body of presentation), with in-depth .docx
Deliverable Length  5 slides (body of presentation), with in-depth .docxDeliverable Length  5 slides (body of presentation), with in-depth .docx
Deliverable Length  5 slides (body of presentation), with in-depth .docx
 
Deliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docxDeliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docx
 
Deliverable Length  1-2 pagesSociologists cite the weakening .docx
Deliverable Length  1-2 pagesSociologists cite the weakening .docxDeliverable Length  1-2 pagesSociologists cite the weakening .docx
Deliverable Length  1-2 pagesSociologists cite the weakening .docx
 
Deliverable LengthWord count will varyDetailsWeekly tasks or.docx
Deliverable LengthWord count will varyDetailsWeekly tasks or.docxDeliverable LengthWord count will varyDetailsWeekly tasks or.docx
Deliverable LengthWord count will varyDetailsWeekly tasks or.docx
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx

  • 1. Denial & Deception – Week 7 Select one of the ‘Questions to Ponder’ as your topic for this week's Forum posting. Original post must be 250+ words. Student responses must be 150+ words. Questions to Ponder Who are the world's leading practitioners of Denial and Deception? How have they developed, or acquired their capabilities? Do they share their capabilities, and if so, with whom? What is the influence of the twenty-four hour news cycle and the internet in Denial and Deception? What role are private companies playing in Denial and Deception proliferation and sophistication? What does the future hold for Denial and Deception operations? Student Response #1 – Harshul Who are the world's leading practitioners of Denial and Deception; How have they developed, or acquired their capabilities; Do they share their capabilities, and if so, with whom; China and Iran are the world's leading practitioners of Denial and Deception. In true Cold War fashion the PRC continues to mislead the international community about its arms build up and its geo-strategic goals in the Far East and South East Asia. Tactically, through the use of conventional forms of deception and “...electronic decoys, infrared decoys, false-target generators and angle reflectors” (Gertz 2008, np) during operations and testing procedures the Chinese have prevented others from gaining insight into their capabilities and intentions. Strategically, as it grows stronger the PRC aims to
  • 2. use all available means to settle territory related disputes with Vietnam, Philippines, Taiwan and Japan. Along with their own ingenuity and skill the most important sources for technological tools of deception and denial have come from business transactions with Russia and outright theft from the United States. It has also acquired American technology through our allies such as Israel. China has shared its capabilities with Pakistan, Iran, Syria and North Korea. Iran has certainly practices both functions in order to hide the progress or lack there of concerning its nuclear ambitions. It has also practiced deception in order to intimidate its neighbors and the United States. In 2006 the Iranians had released a video of an allegedly successful missile test to showcase their military capability but after careful analysis “...U.S. intelligence officers analyzed the plume of smoke from the missile and determined it matched a video of an earlier Chinese test” (Barnes 2006, np). The Iranians have developed much of their capabilities with help from China and North Korea and have shred their capabilities with their allies in the region, mainly Syria and Lebanon. References 1. Gertz, Bill. 2008. Denial and Deception. Inside the Ring. The Washington Times, March 28, http://www.washingtontimes.com/news/2008/mar/28/inside-the- ring-60000234/?page=all (accessed October 24, 2014) 2. Barnes, Julian, E. 2006. Video of Iranian Missile Test Is Fake, Pentagon Says. Los Angeles Times, September 10, http://articles.latimes.com/2006/sep/10/world/fg-missile10 (accessed October 24, 2014) Student Response #2 – Bobby Who are the world's leading practitioners of Denial and
  • 3. Deception? How have they developed, or acquired their capabilities? Do they share their capabilities, and if so, with whom? The Iranian government has been great at conducting denial and deception over the years. In an article written by Mike Nizza suggested that a photo showing a launch of four missiles was actually only three had launched (Nizza and Lyons 2008). The image was released by Sepah News, which is the media wing of the Iran’s Revolutionary Guard and was mostly doctored up with photo shop. There are many cases where Iran is hiding the real and showing the fake. For example, Iran’s nuclear program continually states their program is designed for electricity generation versus nuclear weapon (Reporter 2011). Then why do they need the so many centrifuge machines running, according to an article in The New York Times, the Iranians have 19,000 and 10,200 are operating (Board 2014). For Iran, acquiring a nuclear weapon is a matter of national pride and to project power in the region. Another case is the denial and deception that took place at Parchin. According to Maseh Zarif, the regime did not allow inspectors from the International Atomic Energy Agency (IAEA) access (Zarif 2012). By not gaining entry, this provides miss leading information and IAEA cannot make an accurate assessment of their nuclear program. So now that we have an understanding of how Iran is able to use D&D to continue with their weapons program let us examine where they are acquiring their technology. There is numerous sources of information in relation to the relationship that Iran has with both, China and Russia. They are both fully capable countries that could provide growth in the Iranian uranium enrichment program or provide items that are needed to the continual development. Another tactic currently being employed by Iran is the stand back and let the situation in Iraq fester. The diversion going on in Iraq, Syria, and the Ukraine puts Iran on the back burner so the rest of the world are focused on other hot spots. The
  • 4. deteriorating situation in Iraq also provides an environment where the US and Iran have some common ground against an enemy known as ISIS (Nader 2014). By the US and Iran working together provides another opportunity for Iran to negotiate terms on an agreement. The only country really concerned with Iran is Israel because Iran still makes harsh statements against them about their ultimate destruction in the region. There are numerous concerns on about Iran gaining nuclear weapons within the region because this would lead to great instability. Additionally, this would create an offset of power and could lead to further escalation in an area that has already been having problems. Bibliography: Board, Editorial. "Impasse Over Iran’s Nuclear Program." The New York Times , 09 2014. Nader, Alireza. "Why Iran Can't Walk Away from Nuclear Talks So Easily." RAND Analysis , 09 2014. Nizza, Mike, and Patrick J. Lyons. "In an Iranian Image, a Missile Too Many." The Lede , 07 2008. Reporter. "Blast Kills Commander at Iran Base." The New York Times , 11 2011. Zarif, Maseh. "Iran's Denial and Deception at Parchin." Iran Tracker , 07 2012. OSINT – Week 7
  • 5. For this forum, you are to answer one or more of the questions listed below. The original post must be a minimum of 250 words. Questions: 1. Detail what the United States government is doing in support of open source intelligence. 2. Describe the main elements of the OSINT strategy of the United States. Why would the government baulk at hiring private organizations/companies to collect OSINT? 3. Assert and defend an appropriate role for the government in facilitating the use of OSINT at an international level. Is it different than the use of OSINT at a Federal, state, or municipal level? Give examples to support your position. Student Response #1 – Dwayne Why would the government baulk at hiring private organizations/companies to collect OSINT? The changes that followed 9/11 were dramatic for the Intelligence Community (IC). Part of the many restructuring processes that took place was the development of the Office of the Director of National Intelligence (ODNI). Under the umbrella of the ODNI, both intelligence agencies and their civilian counterparts, the contractors, where brought together. The IC has a budget exceeding $44 billion dollars. Many are surprised by the fact that around half of that sum is paid out to contractors and private companies. Even with that expenditure, there are times when the government is hesitant to hire those firms.
  • 6. One major drawback of the use of contractors in OSINT processes is they often lack the rigid boundaries of “tradecraft” that are so well established for government employees. Contractors, at times, have the freedom to make analytical judgments without references to certain source material. While this may be acceptable for a private client, it does not suit policy makers well. The judgments without sources can create conflict or tension because of the trade off that occurs between information efficiency and information quality. Information quality is the primary concern for government agencies, as their intelligence is meant to support policy level decisions, and those decisions must be based off of traceable sources for accountability purposes. While the lack of sources does not necessarily indicate bad intelligence, policy makers are accountable for their choices, so their choices must be based off of intelligence that can be audited. On the flip side of the coin, information efficiency is a major factor in the private sector intelligence contractors. They often have rigid deadlines that must be met in order to honor their contract, and as a result, may be forced to rely more on an analysts professional judgment and less on establishing and organizing the source material for others to reference. Resources Bean, H. 2006. Tradecraft versus science: Intelligence analysis and outsourcing . Retrieved from https://edge.apus.edu/access/content/group/security-and-global- studies- common/Intelligence%20Studies/INTL%20422/Content/Week% 207/Outsourcing%20OSINT_Bean.pdf Student Response #2 – Sammy Why would the government baulk at hiring private
  • 7. organizations/companies to collect OSINT? Open Source Intelligence (OSINT) is defined as the collections, exploitation, analysis, and dissemination of publically available material to answer an intelligence requirement. For OSINT to become effective and useful, there should be a close relationship between the consumer and the producer. General Michael Hyden, Director of the CIA indicated that “while OSINT may be unclassified, out interest in it is no” (Crowe & Davidson). For OSINT to become effective, the interest of the customer must be clear to the producer, otherwise, products will be of little or no use to the customer. Most OSINT is being produced by contractors, who may not hold a security clearance precluding them from knowing who the customer is or become privy to the real interest for asking for this information (Crowe & Davidson). For example, Open Source Center (OSC) was established by the Director of National Intelligence (DNI) and managed by the CIA. Contractors working for OSC are fully aware of their prime customer and understand that the products are consumed, mainly, by their executive agency. Since the correlation between OSC and the CIA is a public knowledge, anyone providing OSINT to OSC can deduce why the CIA would be interested in this type of reporting which may be classified information. Additionally, contractors may use software applications used by commercial vendors to sift through and generate their intelligence reporting. There is always a risk when a contractor uses another commercial product because of biases to promote or demote another contractor’s product which may skew their objectivity in generating OSINT reports. One more drawback is the framework private agencies give their analysts to generate products. Private firms operate for profitability, thus analysts must abide by special format, word count, deadline, and a very narrow set of rules without knowing the larger context (Bean, 2006).
  • 8. References: Bean, H. 2006. Tradecraft versus science: Intelligence analysis and outsourcing. Retrieved from https://edge.apus.edu/access/content/group/security-and-global- studies- common/Intelligence%20Studies/INTL%20422/Content/Week% 207/Outsourcing%20OSINT_Bean.pdf Crowe, June, and Tomas Davidson. Accessed November 16, 2014. https://edge.apus.edu/access/content/group/security-and- global-studies- common/Intelligence%20Studies/INTL%20422/Content/Week% 207/THE%20%E2%80%9CGREY%E2%80%9D%20INTERSECT ION%20OF%20OPEN%20SOURCE%20INFORMATION%20A ND%20INTELLIGENCE.pdf.