Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By John Rolls (Reporter)
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Draining The Swamp: FBI Needs Protection From American Political Extremists +Video

% of readers think this story is Fact. Add your two cents.


By Jim Kouri / Conservative Base

Deep State hacks who conspired with others including the news media to destroy President Donald Trump. They weaponized the Justice Dept. and the FBI for the benefit of the Democratic Party.

Over the last three years, the FBI has been exposed as an actual “tool” of the Democratic Party, especially those who are actively pursuing the goals of the “Deep State.”

The names of James Comey, Andrew McCabe, Peter Strzok and others have been connected to a suspected plot to destroy the Trump presidency. Using a suspected illegal plan to deliver Donald Trump into the hands of a deranged Democratic Party and their cohorts in the news and entertainment industries, many Americans have seen the lengths to which Trump-haters will go to remove someone with whom they may disagree.

However, with a number of changes already being implemented within the Department of Justice, the FBI, the State Department and other renegade bureaucracies, U.S. government leaders in law enforcement and intelligence agencies must return to their primary functions: protecting the nation, its citizens and their own officials, agents and officers.

Internal security is vital to the Federal Bureau of Investigation’s efforts to protect the United States. As the agency responsible for counterintelligence, counterterrorism, cyber, and major criminal investigations, the FBI is a high-priority target for virtually every hostile and many otherwise friendly intelligence services, terrorist organizations, criminal groups, and individuals with grievances against the US Government.

The nature of the threat posed by these various groups and individuals is a function of their intent, and thus varies with the particular agenda of each. Criminal groups, for example, benefit from knowing specifics of ongoing investigations. Timely knowledge of who is under investigation, which communication lines are under surveillance, or who is providing information to the government can effectively cripple an ongoing case.

Because of its high visibility as a well-known element of the US Government, many terrorist groups view the FBI as a desirable target for attack. Because of these threats, the director of the FBI took immediate action to consolidate and centralize management of security programs by placing responsibility and authority for all such programs under its relatively new security division.

The security program will expand over the next five years guided by a philosophy of evolutionary rather than revolutionary change. It is assuming an oversight role in the management of security programs that were previously controlled by the field offices and the FBI Headquarters’ divisions. The FBI recognizes that all security threats, vulnerabilities, and risks must be identified, assessed, evaluated, and managed using a systematic and rational process as part of a continuing operational strategy.

Security and counterintelligence professionals generally agree that the most significant threat to an organization’s internal security is betrayal by a trusted insider. An individual with legitimate access who chooses to betray the FBI’s trust is particularly damaging because compromise of information may continue over an extended period of time and encompass a wide range of programs.

Worse, the insider can target his or her activities to compromise the information most relevant to the needs of the adversary. If undetected over a period of time, a person could rise to a leadership position within an organization from which he or she may influence policy.

To enhance countermeasures against these threats, the FBI developed, implemented, and expanded its Financial Disclosure and Personnel Security Polygraph Programs. These measures have already minimized the threat, but additional actions are needed to further protect the FBI and the nation.

The proliferation of information technology in recent years has resulted in dramatic changes in the threat environment. The explosion in electronic data handling has profoundly altered the manner in which most modern organizations, including the FBI, manage information.

While modern technology allows the storage, movement, and retrieval of vast amounts of data to the benefit of investigators and analysts, it also allows, absent highly sophisticated security precautions, the lightning-fast theft of vast amounts of information, or the crippling of response capabilities in a time of crisis.

Experience has shown that the cyber threat is typically a human problem, not a technical problem. Even though it is true that information systems and networks offer attractive targets, it is invariably the human element in those systems that make them exploitable. Information systems and networks have human involvement during the complete system lifecycle. They are vulnerable during construction, shipment, installation, operation, maintenance, and disposal.

Advanced technology solutions alone will not solve the problem. The approach must be multidisciplinary and must cover the complete lifecycle of information systems, data, and human intervention. To meet these threats, the FBI developed and implemented a Certification and Accreditation process that has been incorporated into the organization’s information technology investment and development lifecycle, including all legacy systems.

However, additional measures are needed to further protect the FBI from the compromise of its information technology systems.

The unique position occupied by the FBI within the US Government and in the public consciousness makes it a high priority target for terrorist groups seeking publicity, for criminal organizations wishing to intimidate or take reprisal, and for lone malcontents with specific grievances. No other federal government agency deals as directly, in what is nearly always an adversarial fashion, with the variety and number of violence-prone groups as does the FBI.

Bomb threats and threats of other violence involving FBI facilities and personnel, while not commonplace, occur with sufficient frequency to generate increasing concern. There are an increasing number of threats directed at individual agents and their families as intimidation or retribution for activities carried out in the performance of their official duties.

Sources: US Department of Justice, Federal Bureau of Investigation, National Association of Chiefs of Police


NACOP Chiefs of Police – James Kouri

Jim Kouri is a member of the Board of Advisors and a former vice president of the National Association of Chiefs of Police, Inc. a 501 (c) (3) not-for-profit organization incorporated in Florida in May 1967. The Association was organized for educational and charitable activities for law enforcement officers in command ranks and supervisory agents of state & federal law enforcement agencies as well as leaders in the private security sector. NACOP also provides funding to small departments, officers and the families of those officers paralyzed and disabled in the line of duty.

https://conservativebase.com/draining-the-swamp-fbi-needs-protection-from-american-political-extremists/

***Support BeforeItsNews by trying APeX (far superior to colloidal silver) or any of ourfour other great health products at www.mitocopper.com ***



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 2 comments
    • tonyw

      good story but how do you maintain your integrity and responsibilities if you isolate a group from becoming rouge …from those who’s task is to ensure they are operating within their guidelines ..just cannot be done.. I am all in agreeance on getting rid of politicians..at least in today’s party sense, to individuals elected for whatever reasons by their electors. But even then ..the real shadow government still runs the show.. That pommy TV series which made light of the real people “steering” the outcome of any political decision.. Worth a watch to get an uptake on how the government system in the west really works.. Only in our cases ….its not at all funny

    • tonyw

      I forgot to mention the show..it was Yes Minister and the follow up Yes Prime Minister..

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.