Can you respond (with your opinion or criticism) to this student who answered tw

GET HELP WITH YOUR ESSAY

If you need assistance with writing your essay, our professional Essay Writing Service is here to help!

ORDER THIS PAPER NOW

Can you respond (with your opinion or criticism) to this student who answered two questions? Thank you. Analyze and evaluate the Russian subversion case files and the video documentaries, then hypothesize on how to prevent similar subversion of societal good order, and how to re-instate the four communist-abolished legal instruments with which to investigate subversion.
Russia and China have been leading contenders in the attempt to overtake the United States through subversion techniques. Russia will continue its subversion efforts with nations that they deem as hostile, such as the United States. Unfortunately, the United States failed to protect itself from the subversion attempts by Russia. A notable subversion event occurred in 1961 when 18 Russian subverters were smuggled into western countries, to include the U.S. This subverter network was successfully able to compromise 15 to 35 national citizens. This led to roughly 3,000 undercover Russian-trained subverters were operational. These individuals engaged in demonstrations, riots, and terrorist outrages.
The four stages to change perception and induce confusion are demoralization, destabilization, crisis and normalization. Subversion has become easier through the technological developments of cyberspace and social media. To challenge subversion attempts, it is important that the United States strengthens its security, to include cyberspace. Creating a divide among people is far to simple with the social media. Unfortunately, in today’s world, people have access to a world-wide information sharing platforms. Currently, the great political divide among Americans provides hostile nations with the perfect opportunity to engage in subversion attempts. Countermeasures should be implemented to undermine Russian subverters’ tactics. To do this, intelligence agencies should have units tasked with analyzing subversion techniques with nations that have a hostile or unstable relationship with the United States. By gaining a more thorough understanding of the subversion techniques, the United States intelligence community can gain a better understanding on how to counter these issues.
References
Hutton, Bernard (1961). “Institute 63-I & the KGB Special Division for Subversion.” Retrieved December 2nd, 2020: https://myclassroom.apus.edu/shared/commonfolder/security-and-global-studies-common/Intelligence%20Studies/INTL610/PDF%20Files/SubversionOrgchart.pdf
2. Analyze and evaluate the Northern Ireland Chinese-Intercept, and develop proposals on how to undermine PIRA terrorism and turn the population against Chinese intervention / alliance, through exploiting the intercept in black propaganda fashion, after suitable time to try to trace back.
The Northern Ireland Chinese-Intercept is considered a false flag operation. To counter an incident like the Northern Ireland Chinese-Intercept, the communications should have been handled covertly and there should have been efforts in place to track them back to China’s chain of command. Deliveries should have been tracked to ensure there were no smuggling attempts. Lastly, the Chinese intercept could have been utilized as a tool to influence opinion away from the PIRA. Unfortunately, this undermines the western world’s integrity and image of honesty and democracy (AMU 2020). However, efforts could be implemented to expose PIRA. PIRA is considered to be a terrorist group that utilizes black propaganda to influence their audience. Their efforts are directed toward attacks on individuals such as police officers, government officials, security forces etc. and damaging physical targets to induce terror in the public. To undermine PIRA, it is important to understand their tactics and abilities. For instance, they avoid areas that are under surveillance, attempt to blend in by avoiding security forces and wearing disguises, and attacking surveillance technologies. They utilize relatively advanced weapon technologies and had a thorough understanding of forensics to avoid being caught. (Jackson et al. 2007, 83-114). Just like undermining any terrorist organization, it is important for the intelligence community to understand their capabilities and intentions.
References
AMU (2020) “Methods to Counter or Exploit an Operation.” Retrieved December 2, 2020: https://myclassroom.apus.edu/d2l/le/enhancedSequenceViewer/21349?url=https%3A%2F%2Ff54cbe36-23a9-4505-85fe-e251f80ec34d.sequences.api.brightspace.com%2F21349%2Factivity%2F1548754%3FfilterOnDatesAndDepth%3D1 Jackson, Brian A., Peter Chalk, R. Kim Cragin, Bruce Newsome, John V. Parachini, William Rosenau, Erin M. Simpson, Melanie Sisson, and Donald Temple (2007). “Provisional Irish Republican Army.” In Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies, 83-114. Accessed December 2, 2020. http://www.jstor.org/stable/10.7249/mg481dhs.13.

ORDER THIS PAPER NOW