SlideShare a Scribd company logo
1 of 10
Box Station, Inc. Mission Statement
To provide our customers products that are a balance of quality
and expense in gaming entertainment.
Programs
Import Program that brings inexpensive electronics from China.
1. This will maximize the company’s profit margin while
keeping the final product at a low cost to the customer.
1. The cost of the electronics and import fees are well below
those of having the products made within the U.S.
Interstate Commerce Program tends to hire foreign workers.
1. The cost of hiring foreign workers is lower than hiring local
workers
1. No benefits such as medical/dental, paid time off, or set
hours are used.
1. Workers routinely work late hours loading and unloading
trucks, driving trucks containing shipments across the country
with minimal breaks between shipments, and rarely complain
about working conditions.
Assets
14 Warehouses Nationwide sitting on 40 acres of land at each
one
400 truck/trailers for transporting goods
28 small vehicles
6 forklifts at each location
13,000 employees (two Senior Executives at each site, 4
Managers at each site, and the rest are employees/workers)
13,500 desktop computers
1,200 Desk phones
3,000 Cellular phones
Intranet (One server at your location, 2 copiers at each location,
1 color printer at each location with 5 total printers at each
location)
Normal office furnishings
Current Countermeasures
1. 6 foot chain link fence surrounding each property with a
guard shack at two entrances on each property
1. Guard shack is manned with one unarmed guard 24 hours a
day 7 days a week.
FBI Domestic Extremists Report
Buy American Direct (BAD)
Founded in 2002 and located throughout the U.S., BAD has
approximately 10,000 members and is reportedly dedicated to
stopping the import of Chinese products into the U.S. They
have been known to use violence and destroy property in
attempts to assert their influence. Many of their members are
convicted felons of assault, extortion, drugs, fraud, firearms,
and explosives laws. Nearly half of their members hold
advanced degrees in Accounting, International Economics,
Horticulture, IT Systems, and Business Administration.
BAD is very well funded and is assessed by the Drug
Enforcement Administration as one of the leading marijuana
growers and distributors throughout the U.S.; with an annual
income estimated to be around $3 Million.
Local Sheriff’s Office Incident Report
Yesterday three 24 foot center console fishing boats were stolen
from Wilson Marine. WILSON arrived at the business at 6:30
a.m. to open and noticed the gate to the storage yard had been
smashed and three boats were missing. All three boats were
described as 24 Foot Center Console Fish Reaper boats with
twin 300 hp engines on each. Each boat was valued at $84,000.
Two of the boats were white with green pin striping and one
was white with a large blue stripe. All three have sleeping
quarters below the main deck. WILSON has notified his
insurance provider.
Patrol Officer Ben Katchenum
Local Sheriff’s Office Incident Report 002-2015
This morning Deputy James Fuller observed a suspicious
vehicle parked on an empty street aimed in the general direction
of Box Station, Inc., with two occupants in the vehicle. Deputy
Fuller approached the vehicle and requested identification from
both occupants. The occupants were identified as Richard
Parsons and Robert Jackson. Although Parson had quite an
extensive previous arrest record there were no active warrants.
Jackson claimed to be the president of some kind of activist
group. Both were told to leave the area and they departed
without incident.
Deputy James Fuller
City Police Department Incident Report 003-2015
Today a local bar owner, Mr. Pedro Sanchez, 123 Central Ave.,
Yourtown, ST reported a loud and boisterous patron had to be
removed by security approximately one month ago after getting
very drunk and loud. Sanchez went on to say that this was not
unusual but the thing he thought was odd about this guy was
that he started off the evening asking the waiting staff if they
knew where the Box Station, Inc. employees had their uniforms
cleaned. Sanchez thought this was really odd but got too busy
to look further into it and eventually forgot about it until
yesterday when a different person came into the bar asking the
same type of questions. This time it was a blonde female and
she was asking about what kind of identification cards are
needed to get into the Box Station, Inc. facility. Sanchez said
once his employees told him about this he immediately called
the police. Sanchez also reported that the female had departed
the bar just a few minutes before the police arrived. He
believed she might have been driving a blue sports car.
Interview of Mr. Larry Johnson, Network Administrator, Box
Station, Inc.
Johnson was interviewed and stated that Box Station, Inc. has
the most up to date and advanced network infrastructure
available with state of the art firewalls, encryption, and virus
protection programs. He is notified immediately of any
unauthorized attempts to gain access to their network and he is
the person that approves what employees need access to the
network. Box Station, Inc. uses a Network Encryption Access
Card (NEAC) for employees that require access to their
network. A personalized PIN is required along with the NEAC
in order to log on. If an employee’s NEAC becomes missing
they are required to report to Johnson within 24 hours so he can
disable the missing card. A few cards have gone missing
recently and there were several unsuccessful attempts to gain
access to the network.
Your Name Here
Interview of Officer Steve Ward, State Fish and Wildlife
Enforcement Division
Officer Ward stated there had been a lot of boating activity on
the river immediately behind Box Station, Inc., recently. He
believed this was odd because of the time of year. Usually all
he sees this time of year are duck hunter in blinds but recently
he has observed several fishermen spending a lot of time
anchored in the river between 100 – 250 yards away from Box
Station, Inc. The oddest thing Officer Ward had observed was
that the fishermen did not have any bait on their hooks.
Your Name
Massachusetts Highway Patrol Incident Report
This morning Trooper Michelle Smith, Massachusetts Highway
Patrol, stopped a rental moving van for speeding. Upon
approaching the driver, she noticed the vehicle license plate was
expired. Trooper Smith requested a Driver’s License,
Registration, and Bill of Laden from the Driver. The driver
could not produce a vehicle registration or Bill of Laden and
began exhibiting nervous behavior. Trooper Smith decided to
search the vehicle and discovered 2000 pounds of T-N-T in the
back of the vehicle.
Trooper Smith arrested the driver and he subsequently
confessed that he was transporting the explosives to your town
to blow up a distribution warehouse of a company that imports
Chinese products.
Trooper Michelle Smith
National Crime Information Center (NCIC) Interstate
Identification Index (III)
Jackson, Robert N.
111-22-3333
DOB: 02/01/1970
Arrest Record: None
No Record on File
End of Report
National Crime Information Center (NCIC) Interstate
Identification Index (III)
Parsons, Richard S.
123-45-6789
DOB: 01/01/1962
Arrest History:
02/01/1989 Witchita, KS Theft of Explosives
03/27/1994 Baltimore, MD Criminal Trespass
02/26/1995 Miami, FL Aggravated Assault
10/11/1998 Macon, GA Possession of
Controlled Substance
04/02/2000 Acron, OH Possession with Intent
to Distribute
04/19/2000 Cleveland, OH Possession of
Explosives (No Permit)
08/11/2005 Manchester, NH Assault, Kidnapping,
Possession of
Automatic Weapon by Felon
01/22/2014 Newark, NJ Jaywalking
No further records or information.
End of Report
Other Investigative Activities
You contacted several Box Station, Inc. warehouses around the
U.S. and discovered through interviews of Box Station, Inc.
employees and officers on those jurisdictions that there had not
been any odd activities or suspicious acts at their locations.
You contacted the FBI in your town and requested they check to
see if the FBI had any record of suspicious activities or threats
against Box Station, Inc. other than the one you are currently
working on. They called back and said there were no other
records of suspicious acts or threats. The FBI reports the
terrorist threat level for the U.S. is Moderate.
You contacted the U.S. Dept. of Homeland Security and they
indicated the current threat level in the U.S. was Elevated.
Suspicious Activity Report 201X-001
Narrative:
Two months ago a suspicious letter was sent to Box Station
Entertainment, Inc., indicating the authors were disgruntled
with the company’s support of foreign trade between the U.S.
and China. Within the letter the group, called Buy American
Direct, said they would stop the import of Box Station games by
“destroying” distribution warehouses within the U.S.
ATF Report of Stolen Explosives
Two weeks ago Builders Inc., a nationwide construction
company, had 2000 pounds of dynamite stolen from a
construction site located approximately 45 miles away from
your town. The site manager stated the explosives are
inventoried daily and kept inside a blast proof vault under lock
and key. The lock had been smashed and 2000 pounds of T-N-T
was missing.
Special Agent Marcus Williams
Suspicious Activity Report 201X-002
Narrative:
Last month the General Manager, Mr David Smith of Box
Station Entertainment, Inc., reported to the local Sheriff’s
Office that there had been several attempts over the last few
months of suspicious people trying to circumvent security at
their entrance gate in order to gain access to the facility that is
located in your county. He provided a general description of
the individuals in which did not provide any distinguishing
features that would help law enforcement identify who they
were. Smith did not think much of these attempts until he
began getting reports from employees of suspicious vehicles
parked along the street near the company gates at certain times
of the day. Employees had reported a large black passenger van
with tinted windows on several occasions and a bright red
moving van on three occasions. On every occasion, employees
noticed either the driver or the driver and a passenger watching
the Box Station entrance gate with binoculars.
This is raw intelligence and not a finally evaluated product.
State Office of Homeland Security has not determined if this
threat is credible. Please direct any questions to your professor
via the General Questions Discussion Board.
Suspicious Activity Report 201X-003
Narrative:
Two days ago the system administrator for Box Station, Inc.,
Larry Johnson, reported to the State Police Cyber Investigations
that three employees’ network encryption access cards had been
stolen and he had received numerous network notifications for
the last week of unauthorized access attempts to the network.
Johnson explained that to gain access to the company’s network,
an encryption card must be inserted into the computer and an
access code typed into the network. Johnson explained that all
of the company’s shipment schedules and locations are located
on their network.
This is raw intelligence and not a finally evaluated product.
State Office of Homeland Security has not determined if this
threat is credible. Please direct any questions to your professor
via the General Questions Discussion Board.
Speech 1311
Perceptions Check Self-Assessment
2014
Name _________________________________ Section
__________________ Date _________
“Checking Perceptions” Assessment
Read textbook Chapter 2 about perceptions. Know the definition
and how to check perceptions about the people you meet every
day.
Write on a word processor (computer) 200-300 words about a
time when you checked to see if your perceptions were accurate
about another person.
Be clear to describe your perception and then where, when and
how you approached the person. Describe if the person reacted
in any way to your “perceptions check” and of course whether
or not your perceptions were accurate.
You must use your textbook authors Seiler and Beall textbook
as your one required credible source in MLA-style format.
Make certain you include a clearly defined, central or
controlling idea. Your instructor will explain these ideas.
Provide total word count as bottom of document.
Save in Microsoft Word and print document, double-spaced in
Times New Roman size-12 font.
This assignment satisfies the THECB/DCCCD District Core’s
Communication 090 Component Area Option (3SCH) for
Critical thinking requirements.

More Related Content

Similar to Box Station, Inc. Mission StatementTo provide our customers pr.docx

In Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docxIn Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docxEstelaJeffery653
 
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docxFor Kim Woods OnlyAssignment 2 Intelligence Gathering.docx
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docxzollyjenkins
 
public_hearing02
public_hearing02public_hearing02
public_hearing02Greg Burton
 
2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)Felipe Prado
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)Felipe Prado
 
Undue Force Civil wrongs Oct 5
Undue Force Civil wrongs Oct 5Undue Force Civil wrongs Oct 5
Undue Force Civil wrongs Oct 5Mark Puente
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followupAnonDownload
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followupRepentSinner
 
2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)Felipe Prado
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationstrupassion
 
Anti-scammers
Anti-scammersAnti-scammers
Anti-scammersUniv
 
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Anatol Alizar
 
2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)Felipe Prado
 
2011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 22011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 2Alan Greggo
 
Ethical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docx
Ethical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docxEthical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docx
Ethical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docxgitagrimston
 
The seventh stage of planned change—Initiating the Program or Po.docx
The seventh stage of planned change—Initiating the Program or Po.docxThe seventh stage of planned change—Initiating the Program or Po.docx
The seventh stage of planned change—Initiating the Program or Po.docxjoshua2345678
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...Pw Carey
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...Pw Carey
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Roger Johnston
 

Similar to Box Station, Inc. Mission StatementTo provide our customers pr.docx (20)

In Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docxIn Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
 
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docxFor Kim Woods OnlyAssignment 2 Intelligence Gathering.docx
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx
 
public_hearing02
public_hearing02public_hearing02
public_hearing02
 
2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
Undue Force Civil wrongs Oct 5
Undue Force Civil wrongs Oct 5Undue Force Civil wrongs Oct 5
Undue Force Civil wrongs Oct 5
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followup
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followup
 
2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
Anti-scammers
Anti-scammersAnti-scammers
Anti-scammers
 
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
 
2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)2600 v07 n4 (winter 1990)
2600 v07 n4 (winter 1990)
 
2011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 22011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 2
 
Ethical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docx
Ethical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docxEthical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docx
Ethical ScrapbookTeam BCJA324 Ethics in Criminal JusticeJ.docx
 
The seventh stage of planned change—Initiating the Program or Po.docx
The seventh stage of planned change—Initiating the Program or Po.docxThe seventh stage of planned change—Initiating the Program or Po.docx
The seventh stage of planned change—Initiating the Program or Po.docx
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 

More from jackiewalcutt

briefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docxbriefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docxjackiewalcutt
 
Briefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docxBriefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docxjackiewalcutt
 
Briefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docxBriefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docxjackiewalcutt
 
Briefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docxBriefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docxjackiewalcutt
 
Briefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docxBriefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docxjackiewalcutt
 
Briefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docxBriefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docxjackiewalcutt
 
Briefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docxBriefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docxjackiewalcutt
 
briefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docxbriefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docxjackiewalcutt
 
Briefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docxBriefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docxjackiewalcutt
 
Briefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docxBriefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docxjackiewalcutt
 
Briefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docxBriefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docxjackiewalcutt
 
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxBriefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxjackiewalcutt
 
Briefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docxBriefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docxjackiewalcutt
 
Briefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docxBriefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docxjackiewalcutt
 
Briefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docxBriefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docxjackiewalcutt
 
Briefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docxBriefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docxjackiewalcutt
 
Briefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docxBriefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docxjackiewalcutt
 
Briefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docxBriefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docxjackiewalcutt
 
briefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docxbriefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docxjackiewalcutt
 
Briefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docxBriefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docxjackiewalcutt
 

More from jackiewalcutt (20)

briefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docxbriefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docx
 
Briefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docxBriefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docx
 
Briefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docxBriefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docx
 
Briefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docxBriefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docx
 
Briefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docxBriefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docx
 
Briefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docxBriefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docx
 
Briefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docxBriefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docx
 
briefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docxbriefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docx
 
Briefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docxBriefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docx
 
Briefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docxBriefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docx
 
Briefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docxBriefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docx
 
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxBriefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
 
Briefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docxBriefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docx
 
Briefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docxBriefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docx
 
Briefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docxBriefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docx
 
Briefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docxBriefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docx
 
Briefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docxBriefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docx
 
Briefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docxBriefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docx
 
briefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docxbriefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docx
 
Briefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docxBriefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docx
 

Recently uploaded

Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 

Recently uploaded (20)

Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 

Box Station, Inc. Mission StatementTo provide our customers pr.docx

  • 1. Box Station, Inc. Mission Statement To provide our customers products that are a balance of quality and expense in gaming entertainment. Programs Import Program that brings inexpensive electronics from China. 1. This will maximize the company’s profit margin while keeping the final product at a low cost to the customer. 1. The cost of the electronics and import fees are well below those of having the products made within the U.S. Interstate Commerce Program tends to hire foreign workers. 1. The cost of hiring foreign workers is lower than hiring local workers 1. No benefits such as medical/dental, paid time off, or set hours are used. 1. Workers routinely work late hours loading and unloading trucks, driving trucks containing shipments across the country with minimal breaks between shipments, and rarely complain about working conditions. Assets 14 Warehouses Nationwide sitting on 40 acres of land at each one 400 truck/trailers for transporting goods 28 small vehicles 6 forklifts at each location 13,000 employees (two Senior Executives at each site, 4 Managers at each site, and the rest are employees/workers) 13,500 desktop computers 1,200 Desk phones 3,000 Cellular phones
  • 2. Intranet (One server at your location, 2 copiers at each location, 1 color printer at each location with 5 total printers at each location) Normal office furnishings Current Countermeasures 1. 6 foot chain link fence surrounding each property with a guard shack at two entrances on each property 1. Guard shack is manned with one unarmed guard 24 hours a day 7 days a week. FBI Domestic Extremists Report Buy American Direct (BAD) Founded in 2002 and located throughout the U.S., BAD has approximately 10,000 members and is reportedly dedicated to stopping the import of Chinese products into the U.S. They have been known to use violence and destroy property in attempts to assert their influence. Many of their members are convicted felons of assault, extortion, drugs, fraud, firearms, and explosives laws. Nearly half of their members hold advanced degrees in Accounting, International Economics, Horticulture, IT Systems, and Business Administration. BAD is very well funded and is assessed by the Drug Enforcement Administration as one of the leading marijuana growers and distributors throughout the U.S.; with an annual income estimated to be around $3 Million. Local Sheriff’s Office Incident Report Yesterday three 24 foot center console fishing boats were stolen from Wilson Marine. WILSON arrived at the business at 6:30
  • 3. a.m. to open and noticed the gate to the storage yard had been smashed and three boats were missing. All three boats were described as 24 Foot Center Console Fish Reaper boats with twin 300 hp engines on each. Each boat was valued at $84,000. Two of the boats were white with green pin striping and one was white with a large blue stripe. All three have sleeping quarters below the main deck. WILSON has notified his insurance provider. Patrol Officer Ben Katchenum Local Sheriff’s Office Incident Report 002-2015 This morning Deputy James Fuller observed a suspicious vehicle parked on an empty street aimed in the general direction of Box Station, Inc., with two occupants in the vehicle. Deputy Fuller approached the vehicle and requested identification from both occupants. The occupants were identified as Richard Parsons and Robert Jackson. Although Parson had quite an extensive previous arrest record there were no active warrants. Jackson claimed to be the president of some kind of activist group. Both were told to leave the area and they departed without incident. Deputy James Fuller City Police Department Incident Report 003-2015 Today a local bar owner, Mr. Pedro Sanchez, 123 Central Ave., Yourtown, ST reported a loud and boisterous patron had to be removed by security approximately one month ago after getting very drunk and loud. Sanchez went on to say that this was not unusual but the thing he thought was odd about this guy was that he started off the evening asking the waiting staff if they knew where the Box Station, Inc. employees had their uniforms cleaned. Sanchez thought this was really odd but got too busy to look further into it and eventually forgot about it until
  • 4. yesterday when a different person came into the bar asking the same type of questions. This time it was a blonde female and she was asking about what kind of identification cards are needed to get into the Box Station, Inc. facility. Sanchez said once his employees told him about this he immediately called the police. Sanchez also reported that the female had departed the bar just a few minutes before the police arrived. He believed she might have been driving a blue sports car. Interview of Mr. Larry Johnson, Network Administrator, Box Station, Inc. Johnson was interviewed and stated that Box Station, Inc. has the most up to date and advanced network infrastructure available with state of the art firewalls, encryption, and virus protection programs. He is notified immediately of any unauthorized attempts to gain access to their network and he is the person that approves what employees need access to the network. Box Station, Inc. uses a Network Encryption Access Card (NEAC) for employees that require access to their network. A personalized PIN is required along with the NEAC in order to log on. If an employee’s NEAC becomes missing they are required to report to Johnson within 24 hours so he can disable the missing card. A few cards have gone missing recently and there were several unsuccessful attempts to gain access to the network. Your Name Here Interview of Officer Steve Ward, State Fish and Wildlife Enforcement Division Officer Ward stated there had been a lot of boating activity on the river immediately behind Box Station, Inc., recently. He believed this was odd because of the time of year. Usually all he sees this time of year are duck hunter in blinds but recently he has observed several fishermen spending a lot of time
  • 5. anchored in the river between 100 – 250 yards away from Box Station, Inc. The oddest thing Officer Ward had observed was that the fishermen did not have any bait on their hooks. Your Name Massachusetts Highway Patrol Incident Report This morning Trooper Michelle Smith, Massachusetts Highway Patrol, stopped a rental moving van for speeding. Upon approaching the driver, she noticed the vehicle license plate was expired. Trooper Smith requested a Driver’s License, Registration, and Bill of Laden from the Driver. The driver could not produce a vehicle registration or Bill of Laden and began exhibiting nervous behavior. Trooper Smith decided to search the vehicle and discovered 2000 pounds of T-N-T in the back of the vehicle. Trooper Smith arrested the driver and he subsequently confessed that he was transporting the explosives to your town to blow up a distribution warehouse of a company that imports Chinese products. Trooper Michelle Smith National Crime Information Center (NCIC) Interstate Identification Index (III) Jackson, Robert N. 111-22-3333 DOB: 02/01/1970 Arrest Record: None No Record on File End of Report National Crime Information Center (NCIC) Interstate Identification Index (III)
  • 6. Parsons, Richard S. 123-45-6789 DOB: 01/01/1962 Arrest History: 02/01/1989 Witchita, KS Theft of Explosives 03/27/1994 Baltimore, MD Criminal Trespass 02/26/1995 Miami, FL Aggravated Assault 10/11/1998 Macon, GA Possession of Controlled Substance 04/02/2000 Acron, OH Possession with Intent to Distribute 04/19/2000 Cleveland, OH Possession of Explosives (No Permit) 08/11/2005 Manchester, NH Assault, Kidnapping, Possession of Automatic Weapon by Felon 01/22/2014 Newark, NJ Jaywalking No further records or information. End of Report Other Investigative Activities You contacted several Box Station, Inc. warehouses around the U.S. and discovered through interviews of Box Station, Inc. employees and officers on those jurisdictions that there had not been any odd activities or suspicious acts at their locations. You contacted the FBI in your town and requested they check to see if the FBI had any record of suspicious activities or threats against Box Station, Inc. other than the one you are currently working on. They called back and said there were no other records of suspicious acts or threats. The FBI reports the terrorist threat level for the U.S. is Moderate. You contacted the U.S. Dept. of Homeland Security and they indicated the current threat level in the U.S. was Elevated.
  • 7. Suspicious Activity Report 201X-001 Narrative: Two months ago a suspicious letter was sent to Box Station Entertainment, Inc., indicating the authors were disgruntled with the company’s support of foreign trade between the U.S. and China. Within the letter the group, called Buy American Direct, said they would stop the import of Box Station games by “destroying” distribution warehouses within the U.S. ATF Report of Stolen Explosives Two weeks ago Builders Inc., a nationwide construction company, had 2000 pounds of dynamite stolen from a construction site located approximately 45 miles away from your town. The site manager stated the explosives are inventoried daily and kept inside a blast proof vault under lock and key. The lock had been smashed and 2000 pounds of T-N-T was missing. Special Agent Marcus Williams
  • 8. Suspicious Activity Report 201X-002 Narrative: Last month the General Manager, Mr David Smith of Box Station Entertainment, Inc., reported to the local Sheriff’s Office that there had been several attempts over the last few months of suspicious people trying to circumvent security at their entrance gate in order to gain access to the facility that is located in your county. He provided a general description of the individuals in which did not provide any distinguishing features that would help law enforcement identify who they were. Smith did not think much of these attempts until he began getting reports from employees of suspicious vehicles parked along the street near the company gates at certain times of the day. Employees had reported a large black passenger van with tinted windows on several occasions and a bright red moving van on three occasions. On every occasion, employees noticed either the driver or the driver and a passenger watching the Box Station entrance gate with binoculars. This is raw intelligence and not a finally evaluated product. State Office of Homeland Security has not determined if this threat is credible. Please direct any questions to your professor via the General Questions Discussion Board. Suspicious Activity Report 201X-003 Narrative: Two days ago the system administrator for Box Station, Inc., Larry Johnson, reported to the State Police Cyber Investigations that three employees’ network encryption access cards had been stolen and he had received numerous network notifications for the last week of unauthorized access attempts to the network. Johnson explained that to gain access to the company’s network,
  • 9. an encryption card must be inserted into the computer and an access code typed into the network. Johnson explained that all of the company’s shipment schedules and locations are located on their network. This is raw intelligence and not a finally evaluated product. State Office of Homeland Security has not determined if this threat is credible. Please direct any questions to your professor via the General Questions Discussion Board. Speech 1311 Perceptions Check Self-Assessment 2014 Name _________________________________ Section __________________ Date _________ “Checking Perceptions” Assessment Read textbook Chapter 2 about perceptions. Know the definition and how to check perceptions about the people you meet every day. Write on a word processor (computer) 200-300 words about a time when you checked to see if your perceptions were accurate about another person. Be clear to describe your perception and then where, when and how you approached the person. Describe if the person reacted in any way to your “perceptions check” and of course whether or not your perceptions were accurate. You must use your textbook authors Seiler and Beall textbook as your one required credible source in MLA-style format. Make certain you include a clearly defined, central or controlling idea. Your instructor will explain these ideas. Provide total word count as bottom of document. Save in Microsoft Word and print document, double-spaced in
  • 10. Times New Roman size-12 font. This assignment satisfies the THECB/DCCCD District Core’s Communication 090 Component Area Option (3SCH) for Critical thinking requirements.