Reference no: EM131218737
Assignment
You are a counterintelligence officer for the Defense Intelligence Agency (DIA) assigned to the Critical Technology Protection Division. Your division is responsible for providing counterintelligence support to research, development, and acquisition (RDA) missions. To accomplish this mission, your team has been asked to provide a counterintelligence threat briefing to a major defense contractor responsible for the research and development of critical U.S. defense technology. The purpose of this report is to help prevent foreign threats from acquiring U.S. critical program information to exploit and degrade its combat effectiveness and technical superiority.
Group Portion
For this assignment, using the Small Group Discussion Board, you must review and discuss counterintelligence collection as well as the current list of U.S. critical technologies with your group.
• As a group, do the following:
• Discuss counterintelligence collection methods.
• Consider sources, techniques, and common operating pictures.
• Examine the list of U.S. critical technologies.
• A current list of critical technologies can be found within your Phase 3 Web resource titled Military Critical Technologies List.
• Come to a group consensus, and select 1 technology from the list that will be examined in this assignment from a counterintelligence perspective.
Individual Portion
Once your group has chosen a piece of critical technology, each member of the group must prepare a counterintelligence threat assessment of 800-1,000 words about the group's selected technology.
• Using the information from the course materials, the textbook, outside research, and the small group discussion, provide a threat assessment introduction on counterintelligence collection.
• What methods and techniques are used in counterintelligence collection? Explain.
• What are common sources for counterintelligence? Explain.
• Using the information from the course materials, the textbook, outside research, and the small group discussion, draft the body of your counterintelligence threat assessment about the selected technology. The assessment should include the following sections:
• A description and brief summary of the technology
• Applications for which the technology is used
• Which organizations use this piece of technology
• Who develops or manufactures this technology
• Which foreign adversaries are potentially interested in this technology
• Methods this adversary may use to acquire this technology
• Implications if this technology were to be compromised
• Possible vulnerabilities for protecting this technology
• Recommendations to safeguard this technology.
State the difference between management and leadership
: COR169 Lead and Influence Assignment. For this assignment, you will be assessed on the following learning outcomes: Identify the key attributes of leaders and their sources of power, State the difference between management and leadership and Recognis..
|
Which approach makes the most sense to you
: Provide examples of each approach. Discuss their advantages and disadvantages. How are they different? Which approach makes the most sense to you? Is it possible to use both? When? Why?
|
What is the audience for the advertising
: What options does the advertiser have for targeting the advertisement to particular types of customers? What data do they make available to measure the performance of your campaign?
|
Advantage of a wireless connection
: "One advantage of a wireless connection is that workers can bring their own mobile devices to connect to the network." Tutor, If you would like to use the BYOD (Bring Your Own Device) for a new network,
|
What are common sources for counterintelligence
: What methods and techniques are used in counterintelligence collection? Explain. What are common sources for counterintelligence? Explain.
|
Did the product design influence your decision
: Select four people who, you know quite well. Using the online communication style assessment, assess the communication style of each individual. Explain how this information can improve your relationship with each of these people.
|
Several clients and they all wanted voip
: WAN technologies such as MPLS and ATM offer strong QoS controls. As an example, My teacher have worked with several clients and they all wanted VoIP, not ATM. tutor, would you know why is that? Please explain
|
System using the ifupg five-step procedure
: Compute the number of function points for this system using the IFUPG five-step procedure, stating carefully the assumptions you make.
|
How does the short term time frame impact long term profit
: How does this short term time frame impact long term profit maximization? Should the SEC change their regulations of public corporations to require only annual reporting of operations?
|