SlideShare a Scribd company logo
1 of 12
“A secret organization that
gathers information for a
government and operates
outside of normal police or
military channels.”
Walter Lippmann
HISTORY
WW-II
EARLY
EXAMPLES
19th & 20th
century
MODERN
INTELLIGEN
CE
AGENCIES
FRENCH DEUXIEME
BUREAU
1871
ADVENT OF
AGENCIES
INCREASE IN
CAPABILITIES
AND
IMPORTANCE
BRITISH
SECRET
SERVICE
BUREAU
2
COLLECTION OF
INFORMATION
Gathering of data and intelligence through
various sources such as human intelligence,
signals intelligence, imagery intelligence,
and open-source intelligence.
3
DISSEMINATION OF
INTELLIGENCE
Sharing of intelligence with
relevant government agencies,
officials, and decision-makers to
inform policy-making and national
security strategies.
4
COUNTERINTELLIGENCE
Protection of national security by
identifying and preventing foreign
intelligence services from gaining
access to sensitive information.
5
COVERT OPERATIONS
Conducting secret operations,
such as sabotage, espionage, and
assassination, to support national
security objectives.
6
CYBERSECURITY
Protection of digital infrastructure
and data through the monitoring of
potential cyber threats and
developing effective security
measures.
1
ANALYSIS AND
ASSESSMENT
Interpretation and
evaluation of collected
intelligence to provide
meaningful insights and
predictions for
policymakers.
ROLE
NATIONAL INTELLIGENCE
AGENCIES
Responsible for gathering,
analyzing, and disseminating
intelligence information related to
national security and foreign policy.
MILITARY INTELLIGENCE
AGENCIES
Responsible for providing
intelligence support to the military
operations of a country. They
gather and analyze information
related to enemy forces, weapons,
and capabilities, and provide
tactical and strategic intelligence to
military commanders.
LAW ENFORCEMENT
INTELLIGENCE AGENCIES
Responsible for collecting, analyzing,
and disseminating intelligence
information related to criminal
activity and terrorist threats.
DOMESTIC INTELLIGENCE AGENCIES
Responsible for collecting and
analyzing intelligence
information related to potential
threats to national security and
public safety within a country.
FOREIGN INTELLIGENCE AGENCIES
Responsible for gathering
intelligence information related to
other countries and foreign
entities. They operate primarily in
a foreign country or through the
use of covert operations.
• Interservices Intelligence (ISI)
• Intelligence Bureau (IB)
• Military Intelligence (MI)
• Federal Investigation Agency (FIA)
• Anti-Narcotics Force (ANF)
• Counter Terrorism Department (CTD)
• Intelligence Bureau (IB)
• None officially acknowledged
TYPES
TOP
AGENCIES
CIA,UNITED STATES MI6,UNITED KINGDOM
FSB,RUSSIA
RAW,INDIA MOSSAD,ISRAEL ISI,PAKISTAN
MOSSAD
NATIONAL INTELLIGENCE AGENCY
ABOUT
HISTORY
Founded on 13
December,1949
ANNUAL BUDGET
Its annual budget
is estimated to be
around 10 billion
shekels (US$2.73
billion)
It is estimated that
it employs around
7,000 people
OVERSIGHT
Reports directly to prime
minister of Israel and
Head of Agency.
David Barnea ,Director of
the Mossad
OPERATIONS
2,700 OPERATIONS
HEAD
SIZE
STRUCTURE
DIRECTOR
METSADA-
OPERATIONS
DEPARTMENT
TECHNOLOGY
DEPARTMENT
RESEARCH
DEPARTMENT
LOHAMA
PSICHOLOGIT -
PSYCHOLOGICAL
OPERATIONS
DEPARTMENT
TEVEL -
POLITICAL
ACTION AND
LIAISON
DEPARTMENT
TZOMET-
COLLECTION
DEPARTMENT
DEPUTY
DIRECTOR
DEPARTMENTS
COLLECTION
DEPARTMENT
The collection department has
lead responsibility for
espionage, with field officers
operating under official and
non-official cover around the
world.
RESEARCH DEPARTMENT
Responsible for analysis and
publications, including reports,
open source and daily
intelligence summaries.
TEVEL - POLITICAL ACTION AND LIAISON
DEPARTMENT
The political action and liaison
department is responsible for
liaison with friendly foreign
intelligence agencies, and
back-channel diplomacy with
states with which Israel does
not have official relations.
CAESAREA OR METSADA -
OPERATIONS DEPARTMENT
The special operations division is
responsible for covert actions
such as sabotage, assassinations
and paramilitary operations.
Technology
Department
Responsible for Mossad's own
technological base, such as
computers.
LOHAMA PSICHOLOGIT -
PSYCHOLOGICAL OPERATIONS
DEPARTMENT
Responsible for briefing
friendly journalists and media
spin. Works with Metsada on
psyops.
OPERATIONS
26
JUNE,197
6
THUNDE
RBOLT
• On June 27, 1976, an Air France plane flying from Tel Aviv to
Paris was hijacked by Palestinian and German terrorists and
diverted to Entebbe airport in Uganda.
• The hijackers demanded the release of Palestinian and other
prisoners held in Israeli jails and threatened to kill the hostages
if their demands were not met.
• After several days of negotiations, the Israeli government
decided to launch a military operation to rescue the hostages.
• The operation, called Operation Thunderbolt, was carried out
on July 4, 1976, by more than 100 Israeli commandos who flew
to Uganda in C-130 Hercules transport planes.
• The commandos landed at the airport in the middle of the night
and quickly overpowered the Ugandan soldiers who were
guarding the hostages.
• The hostages were then moved to the transport planes and
flown back to Israel, while the commandos destroyed several
Ugandan fighter planes and other military equipment before
departing.
• The operation resulted in the rescue of 102 hostages, including
all but one of the Israeli passengers, and the death of all the
hijackers and several Ugandan soldiers.
• The operation was widely praised for its precision and speed
and had significant political and military implications for Israel
and the global fight against terrorism.
OPERATIONS
1972
WRATH
OF GOD
• The "Wrath of God" operation was a secret retaliation mission
launched by Mossad, Israel's intelligence agency, in response to
the terrorist attack during the 1972 Munich Olympics in which 11
Israeli athletes were taken hostage and subsequently killed by
Palestinian terrorists.
• The mission began in the aftermath of the attack, when Israel
formed a committee to decide how to respond. The decision was
made to launch a series of targeted assassinations against
individuals deemed responsible for the attack and other high-
profile terrorist operations against Israel.
• The operation was carried out in various countries around the
world over a period of several years. Mossad agents used a variety
of methods to track down and eliminate their targets, including
car bombs, letter bombs, and shootings.
• One of the most well-known assassinations was that of Ali Hassan
Salameh, the chief of operations for the Palestinian terrorist group
Black September, who was killed by a car bomb in Beirut in 1979.
• The operation was controversial, with some critics accusing Israel
of engaging in extrajudicial killings and violating international law.
• The "Wrath of God" operation officially ended in the 1990s, but
some argue that it paved the way for the use of targeted
assassinations as a tool of counterterrorism.

More Related Content

Similar to Presentation2.pptx

Question 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revQuestion 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revkaylee7wsfdubill
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorismAishaAL9
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence communityDoing What I Do
 
CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach BarberZachary Barber
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organizationKethgay Otanio
 
a report of the csis homeland security and counterterrorism.docx
a report of the csis homeland  security and counterterrorism.docxa report of the csis homeland  security and counterterrorism.docx
a report of the csis homeland security and counterterrorism.docxevonnehoggarth79783
 
Plan to Assassinate Kissinger during a visit to Damascus - NSA DOC
Plan to Assassinate Kissinger during a visit to Damascus - NSA DOCPlan to Assassinate Kissinger during a visit to Damascus - NSA DOC
Plan to Assassinate Kissinger during a visit to Damascus - NSA DOCThierry Debels
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organizationKethgay Otanio
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptxRoleenPearlPanal
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the worldZubair
 
Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018Richa Sharma
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2Kerry McCartney-Prout
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceAmber Wheeler
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016cacds_ukraine
 
Artic Homeland Threats
Artic Homeland ThreatsArtic Homeland Threats
Artic Homeland ThreatsLiberteks
 

Similar to Presentation2.pptx (19)

Question 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revQuestion 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, rev
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach Barber
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
 
a report of the csis homeland security and counterterrorism.docx
a report of the csis homeland  security and counterterrorism.docxa report of the csis homeland  security and counterterrorism.docx
a report of the csis homeland security and counterterrorism.docx
 
Plan to Assassinate Kissinger during a visit to Damascus - NSA DOC
Plan to Assassinate Kissinger during a visit to Damascus - NSA DOCPlan to Assassinate Kissinger during a visit to Damascus - NSA DOC
Plan to Assassinate Kissinger during a visit to Damascus - NSA DOC
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organization
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
 
Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018Top 10 most powerful intelligence agencies in the world 2018
Top 10 most powerful intelligence agencies in the world 2018
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
 
Artic Homeland Threats
Artic Homeland ThreatsArtic Homeland Threats
Artic Homeland Threats
 
The work-of-a-nation
The work-of-a-nationThe work-of-a-nation
The work-of-a-nation
 
Nsa
NsaNsa
Nsa
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

Presentation2.pptx

  • 1.
  • 2. “A secret organization that gathers information for a government and operates outside of normal police or military channels.” Walter Lippmann
  • 3. HISTORY WW-II EARLY EXAMPLES 19th & 20th century MODERN INTELLIGEN CE AGENCIES FRENCH DEUXIEME BUREAU 1871 ADVENT OF AGENCIES INCREASE IN CAPABILITIES AND IMPORTANCE BRITISH SECRET SERVICE BUREAU
  • 4. 2 COLLECTION OF INFORMATION Gathering of data and intelligence through various sources such as human intelligence, signals intelligence, imagery intelligence, and open-source intelligence. 3 DISSEMINATION OF INTELLIGENCE Sharing of intelligence with relevant government agencies, officials, and decision-makers to inform policy-making and national security strategies. 4 COUNTERINTELLIGENCE Protection of national security by identifying and preventing foreign intelligence services from gaining access to sensitive information. 5 COVERT OPERATIONS Conducting secret operations, such as sabotage, espionage, and assassination, to support national security objectives. 6 CYBERSECURITY Protection of digital infrastructure and data through the monitoring of potential cyber threats and developing effective security measures. 1 ANALYSIS AND ASSESSMENT Interpretation and evaluation of collected intelligence to provide meaningful insights and predictions for policymakers. ROLE
  • 5. NATIONAL INTELLIGENCE AGENCIES Responsible for gathering, analyzing, and disseminating intelligence information related to national security and foreign policy. MILITARY INTELLIGENCE AGENCIES Responsible for providing intelligence support to the military operations of a country. They gather and analyze information related to enemy forces, weapons, and capabilities, and provide tactical and strategic intelligence to military commanders. LAW ENFORCEMENT INTELLIGENCE AGENCIES Responsible for collecting, analyzing, and disseminating intelligence information related to criminal activity and terrorist threats. DOMESTIC INTELLIGENCE AGENCIES Responsible for collecting and analyzing intelligence information related to potential threats to national security and public safety within a country. FOREIGN INTELLIGENCE AGENCIES Responsible for gathering intelligence information related to other countries and foreign entities. They operate primarily in a foreign country or through the use of covert operations. • Interservices Intelligence (ISI) • Intelligence Bureau (IB) • Military Intelligence (MI) • Federal Investigation Agency (FIA) • Anti-Narcotics Force (ANF) • Counter Terrorism Department (CTD) • Intelligence Bureau (IB) • None officially acknowledged TYPES
  • 6. TOP AGENCIES CIA,UNITED STATES MI6,UNITED KINGDOM FSB,RUSSIA RAW,INDIA MOSSAD,ISRAEL ISI,PAKISTAN
  • 8. ABOUT HISTORY Founded on 13 December,1949 ANNUAL BUDGET Its annual budget is estimated to be around 10 billion shekels (US$2.73 billion) It is estimated that it employs around 7,000 people OVERSIGHT Reports directly to prime minister of Israel and Head of Agency. David Barnea ,Director of the Mossad OPERATIONS 2,700 OPERATIONS HEAD SIZE
  • 10. DEPARTMENTS COLLECTION DEPARTMENT The collection department has lead responsibility for espionage, with field officers operating under official and non-official cover around the world. RESEARCH DEPARTMENT Responsible for analysis and publications, including reports, open source and daily intelligence summaries. TEVEL - POLITICAL ACTION AND LIAISON DEPARTMENT The political action and liaison department is responsible for liaison with friendly foreign intelligence agencies, and back-channel diplomacy with states with which Israel does not have official relations. CAESAREA OR METSADA - OPERATIONS DEPARTMENT The special operations division is responsible for covert actions such as sabotage, assassinations and paramilitary operations. Technology Department Responsible for Mossad's own technological base, such as computers. LOHAMA PSICHOLOGIT - PSYCHOLOGICAL OPERATIONS DEPARTMENT Responsible for briefing friendly journalists and media spin. Works with Metsada on psyops.
  • 11. OPERATIONS 26 JUNE,197 6 THUNDE RBOLT • On June 27, 1976, an Air France plane flying from Tel Aviv to Paris was hijacked by Palestinian and German terrorists and diverted to Entebbe airport in Uganda. • The hijackers demanded the release of Palestinian and other prisoners held in Israeli jails and threatened to kill the hostages if their demands were not met. • After several days of negotiations, the Israeli government decided to launch a military operation to rescue the hostages. • The operation, called Operation Thunderbolt, was carried out on July 4, 1976, by more than 100 Israeli commandos who flew to Uganda in C-130 Hercules transport planes. • The commandos landed at the airport in the middle of the night and quickly overpowered the Ugandan soldiers who were guarding the hostages. • The hostages were then moved to the transport planes and flown back to Israel, while the commandos destroyed several Ugandan fighter planes and other military equipment before departing. • The operation resulted in the rescue of 102 hostages, including all but one of the Israeli passengers, and the death of all the hijackers and several Ugandan soldiers. • The operation was widely praised for its precision and speed and had significant political and military implications for Israel and the global fight against terrorism.
  • 12. OPERATIONS 1972 WRATH OF GOD • The "Wrath of God" operation was a secret retaliation mission launched by Mossad, Israel's intelligence agency, in response to the terrorist attack during the 1972 Munich Olympics in which 11 Israeli athletes were taken hostage and subsequently killed by Palestinian terrorists. • The mission began in the aftermath of the attack, when Israel formed a committee to decide how to respond. The decision was made to launch a series of targeted assassinations against individuals deemed responsible for the attack and other high- profile terrorist operations against Israel. • The operation was carried out in various countries around the world over a period of several years. Mossad agents used a variety of methods to track down and eliminate their targets, including car bombs, letter bombs, and shootings. • One of the most well-known assassinations was that of Ali Hassan Salameh, the chief of operations for the Palestinian terrorist group Black September, who was killed by a car bomb in Beirut in 1979. • The operation was controversial, with some critics accusing Israel of engaging in extrajudicial killings and violating international law. • The "Wrath of God" operation officially ended in the 1990s, but some argue that it paved the way for the use of targeted assassinations as a tool of counterterrorism.