-Research and analyze a counter-terrorism or cyberspace operation which primarily utilized defensive counterintelligence support. Discuss the historical events that let to the mission, identify the agency and the opponent, and identify the defensive principles of deter and detect in the countermeasures. Some examples of relevant counterterrorism operations may include: 1983’s Marine Barracks in Lebanon, 1993 WTC bombing, 1996 USS Cole, 1998 US Embassies in Africa, Sept 11 2001, 2005 London bombings, etc. Some examples of relevant cyberspace operations may include: 2001-2005 Chinese cyberespionage (Titan Rain), 2011 Duqu worm(surveillance malware targeted at Iranian nuclear facilities), 2012 Flame (surveillance malware targeted at the Iranian oil industry), 2012-2013 cyberattacks against U.S. banking industry, etc. –

To whom it may concern,

We can talk about the World Trade Center’s occurrences. If we evaluate, there was evidence/intelligence concerning the attacks. Still, the administration chose not to act upon it, making the event one of the major catastrophes and intelligence failures of its time. Furthermore, it was the second tentative, as the first was a failed bombing attack in its garage area. To my reasoning, the first attack was the preparation phase, as the adversary was testing the security and rigidness of the building. Cyril Richard Rescorla, the director of security for the financial services firm Morgan Stanley at the time, even flew a plane around the towers concluding that if there were to be a next attack, it would be from the air.

All in all, we can argue that although the event displayed the defensive use of counterintelligence, lack of performing and unsharing of the gathered intelligence led to the catastrophe, starting of GWOT and the establishment of the Department of Homeland Security which today acts as a part of America’s Intelligence community.

Can we add these sources to the analysis:
*https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjZoqjphMv8AhV5H7kGHTmJAn8QFnoECAsQAQ&url=https%3A%2F%2Fwww.hsdl.org%2F%3Fview%26did%3D752229&usg=AOvVaw3p03zW_ioh9gmkuv691BpO

**https://www.rand.org/pubs/monograph_reports/MR1782.html

Kind regards


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"


0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *