Reference no: EM131419111
Counter Intelligence
You are a counterintelligence officer for the Defense Intelligence Agency (DIA) assigned to the Critical Technology Protection Division. Your division is responsible for providing counterintelligence support to research, development, and acquisition (RDA) missions. To accomplish this mission, your team has been asked to provide a counterintelligence threat briefing to a major defense contractor responsible for the research and development of critical U.S. defense technology. The purpose of this report is to help prevent foreign threats from acquiring U.S. critical program information to exploit and degrade its combat effectiveness and technical superiority.
For this assignment, you must review and discuss counterintelligence collection as well as the current list of U.S. critical technologies with your group.
• Do the following:
o Discuss counterintelligence collection methods.
- Consider sources, techniques, and common operating pictures.
o Examine the list of U.S. critical technologies.
- A current list of critical technologies can be found within your Phase 3 Web resource titled Military Critical Technologies List.
o Come to a group consensus, and select 1 technology from the list that will be examined in this assignment from a counterintelligence perspective.
Individual Portion
Once your group has chosen a piece of critical technology, each member of the group must prepare a counterintelligence threat assessment of 800 words about the group's selected technology.
• Using the information from the course materials, the textbook, outside research, and the small group discussion, provide a threat assessment introduction on counterintelligence collection.
o What methods and techniques are used in counterintelligence collection? Explain.
o What are common sources for counterintelligence? Explain.
• Using the information from the course materials, the textbook, outside research, and the small group discussion, draft the body of your counterintelligence threat assessment about the selected technology. The assessment should include the following sections:
o A description and brief summary of the technology
o Applications for which the technology is used
o Which organizations use this piece of technology
o Who develops or manufactures this technology
o Which foreign adversaries are potentially interested in this technology
o Methods this adversary may use to acquire this technology
o Implications if this technology were to be compromised
o Possible vulnerabilities for protecting this technology
o Recommendations to safeguard this technology
• Compile your responses in your final individual threat assessment, and submit the file.
What is the cost of each alternative
: The appropriate discount rate for the incremental cash flows is 12 percent. Penn is trying to decide whether it should offer 40 percent of its stock or $87 million in cash to Teller's shareholders.
|
Why canary party believes that there must be something wrong
: As of November 2013, a report states that there have been 31,741 adverse events, 10,849 hospitalizations, and 144 deaths due to HPV vaccines. Explain why The Canary Party believes that there must be something wrong with the vaccine.
|
Research paper dealing with an internet privacy
: Write an research paper dealing with an INTERNET PRIVACY or ETHICS ISSUE that interests you, and has not been resolved through legislation, or other legal means.
|
What will the eps of stultz be after the merger
: What must Stultz feel is the value of the synergy between these two firms? Explain how your answer can be reconciled with the decision to go ahead with the takeover?
|
What are common sources for counterintelligence explain
: What methods and techniques are used in counterintelligence collection? Explain. What are common sources for counterintelligence? Explain.
|
State two possible explanations for rare rash of injuries
: Since the injury to Derrick Rose, at least six NBA players have experienced similar injuries-torn ACLs. State two possible explanations for this rare rash of injuries. Which explanation do you think is more plausible? Why?
|
Does given explanation agree with yours
: "There is a 50% chance of rain today." Contact a weatherperson and ask him or her what this statement means. Does this explanation agree with yours?
|
What is the author saying about career develop - job hunting
: What is the author saying about career develop and job hunting?What tools are available today that can help with a job search?If this was the only resource available as a Career Counselor, how could you use this book to help someone looking for a job..
|
Explain local governmental agencies that need to be involved
: You will compile all sections of the project into a final paper. Explain Any local, state, or federal governmental agencies that need to be involved in your program.
|