<b>The Change in The Activity of The American Intelligence Services in The Security Context of the Last 24 Years</b>
Keywords:September 11, 2001, globalization, intelligence, security environment, NATO, Security, terrorism.
The Change in The Activity of The American Intelligence Services in The Security Context of the Last 24 Years
The security events dynamics poses an overwhelming challenge for the decision makers’political agenda, priorities. The wide range of risks and rhythm of significant security events determine a difficult enterprise for security theories. A scientific analysis of the security evolutions entails a profound historical introspection and an appropriate understanding of the security events with significant impact over the global evolutions. Probably in the next period of time, hundreds of papers will be written regarding the period since 9/11. The aim of this paper is to provide a perspective over the security context, and the intelligence services activity of the last 15 years, period of time dramatically divided by the unprecedented shock and suffering in the history of the from 9/11. The reorganization of the Western Intelligence Community was ordered as a result of the September 11th attacks and with future counterterrorism efforts in mind. Specifically, the 9/11 terrorists exploited the wall between the U.S.’s foreign and domestic intelligence collection efforts, and yet the IRTPA and EO 12333 avoid the issue of how to best integrate foreign and domestic intelligence while minimizing the threat to civil liberties. This manner in which the Western Countries separates its foreign and domestic intelligence collection is particularly exploitable by terrorists and non-state actorsthose currently posing one of the most serious threats to international security. To ensure both the best intelligence integration possible as well as the defense of civil liberties, clear and sensible rules should be formed which dictate how intelligence from these two spheres is collected and in what way and at what level it is integrated and disseminated.
BARCLAY, Jack, ‗Can Al-Qaeda Use Islam To Justify Jihad
Against The United States? A debate In Progress‘, Jamestown Foundation Terrorism
Monitor (Vol. 8, No. 25, July 2010).. p. 13. accesed at 06.04.2014.
British islamist abu Abdallah al-Britani, ―The assassination of Anwar al Awlaki and
Osama Bin Laden will not stop the spread of Islam‖ http://www.memrijttm.org/ accesed at
Eggen, Dan And Pincus, Walter, Porter Goss: Low-key Gives Way To Aggressive,
accesed at 04.04.2014.
Intelligence Authorization Act for Fiscal Year 1995,
accesed at 03.04.2014.
Radicalisation: the role of the internet. Insitute for Strategic Dialogue, Stockholm,
groundPaper_FINAL.pdf). accesed at 06.04.2014.
Report on the Comission on the roles and capabilities of the United States Intelligence
Community, Preparing for the 21st Century. An apraisal for US Intelligence, p. A 23.
accesed at 02.04.2014.
RYAN, Johnny, Countering militant Islamist radicalisation on the internet: a user
driven, IEA, 2007, pp.133-136. accesed at 06.04.2014.
SPÎNU, Daniela, „Imigraţia musulmană şi identitatea naţionalăîn Europa. Împreună
sau separaţi?‖ în Sfera Politicii, Vol.XIX, Nr.4 (158), pp. 83-93. accesed at
The 9/11 Commission Report, chapter 10 Wartime, http://www.9-
commission.gov/report/911Report_Ch10.pdf accesed at 03.04.2014.
The Evolution of the U.S. Intelligence Community-An Historical Overview,
http://www.fas.org/irp/offdocs/int022.html accesed at 02.04.2014
VELDHUIS, Tinka, STAUN, Jørgen, Islamist Radicalisation. A root cause model,
Institutul de Relaţii Internaţionale, Olanda, 2009. accesed at 06.04.2014.
VIDINO, Lorenzo, Radicalization, Linkage and diversity. Currents Trends in
Terrorism in Europe, RAND, 2011. accesed at 06.04.2014
Yet more turmoil at the CIA Jane's. 11 May 2006. accesed at 04.04.2014.
How to Cite
LicenseAll papers licensed under Creative Commons 4.0 CC-BY.
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms:
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.