What methods and techniques are used in counter intelligence

Assignment Help Other Subject
Reference no: EM131186549

Question:

You are a counterintelligence officer for the Defense Intelligence Agency (DIA) assigned to the Critical Technology Protection Division. Your division is responsible for providing counterintelligence support to research, development, and acquisition (RDA) missions.

To accomplish this mission, your team has been asked to provide a counterintelligence threat briefing to a major defense contractor responsible for the research and development of critical U.S. defense technology. The purpose of this report is to help prevent foreign threats from acquiring U.S. critical program information to exploit and degrade its combat effectiveness and technical superiority.

Group Portion (1)

For this assignment, using the Small Group Discussion Board, you must review and discuss counterintelligence collection as well as the current list of U.S. critical technologies with your group.

As a group, do the following:

Discuss counterintelligence collection methods.

Consider sources, techniques, and common operating pictures.

Examine the list of U.S. critical technologies.

A current list of critical technologies can be found within your Phase 3 Web resource titled Military Critical Technologies List.

Come to a group consensus, and select 1 technology from the list that will be examined in this assignment from a counterintelligence perspective.

Individual Portion

Once your group has chosen a piece of critical technology, each member of the group must prepare a counterintelligence threat assessment of 800 words about the group''s selected technology.

Using the information from the course materials, the textbook, outside research, and the small group discussion, provide a threat assessment introduction on counterintelligence collection.

What methods and techniques are used in counterintelligence collection? Explain.

What are common sources for counterintelligence? Explain.

Using the information from the course materials, the textbook, outside research, and the small group discussion, draft the body of your counterintelligence threat assessment about the selected technology. The assessment should include the following sections:

A description and brief summary of the technology

Applications for which the technology is used

Which organizations use this piece of technology

Who develops or manufactures this technology

Which foreign adversaries are potentially interested in this technology

Methods this adversary may use to acquire this technology

Implications if this technology were to be compromised

Possible vulnerabilities for protecting this technology

Recommendations to safeguard this technology

Compile your responses in your final individual threat assessment, and submit the file.

Group Portion (2)

For the second group portion of this assignment, you must discuss, as a group, your findings from your threat assessment and develop a final collective counterintelligence threat briefing for the critical technology your group has chosen.

Evaluate the individual threat assessments of your group members.

Confer with your group, and select the strongest elements of the individual assessments.

There must be at least 1 section used from each group member.

Determine, as a group, how the final document will be formatted, organized, and compiled.

Complete the final collective threat assessment according to the agreed-upon guidelines, and submit the file to your instructor.

Be sure to reference all sources using APA style.

Be sure to add in text quotation

Reference no: EM131186549

Questions Cloud

Create a bus matrix based : Imagine that you are a senior data warehouse architect for LECAL Corporation.  Your company has been contracted by the U.S. Department of Education to develop a data warehouse which will track student performance on a series of planned nationwide ..
Determine the amount of oxygen in the tank : The pressure gage on a 2.5-m3 oxygen tank reads 500 kPa. Determine the amount of oxygen in the tank if the temperature is 28°C and the atmospheric pressure is 97 kPa.
The hamptons home of a famed socialite hits the market : “Before there was Paris Hilton, there was Consuelo Vanderbilt Balsan – a Gilded Age heiress and socialite, renowned for her beauty and wealth. Now Ms. Balsan’s onetime Hamptons home is slated to hit the market priced at $28 million with Tim Davis of ..
Problem regarding the personal identification number : Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in e..
What methods and techniques are used in counter intelligence : What methods and techniques are used in counter intelligence collection? Explain and what are common sources for counterintelligence? Explain.
What kinds of queries would be useful to woodcraft : What kinds of queries would be useful to Woodcraft, assuming that it wants to improve its sales, relationship with its customers, or other aspects of its business? Describe what information you might want to select from the database in the form of a ..
How can we prevent an attack at our firm : Being very specific, explain how did they break in to get this data? Who did the attacking and what did they get? Was the data lost encrypted? Would that help? Why? How can we prevent an attack at our firm?
Thoughts on risks of either changing or not changing course : Over the past several years there has been debate over the directions of U.S. fiscal and monetary policies. On the one hand, there are looming U.S. debt and deficit issues. On the other hand, there are the low interest rate policies of the Federal Re..
Create a start schema model : Imagine that you are a senior data warehouse architect for LECAL Corporation. Your company has been contracted by the U.S. Department of Education to develop a data warehouse which will track student performance on a series of planned nationwide t..

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd