Angelica Leon
Counter-narcotics operations consist of a lot of different components. Within these agencies some if not all employ one or all six intelligence disciplines (INTs) in one way or another. These INTs enhance counter-narcotics operations. When it comes to maritime counter-narcotic operations the Joint Inter-Agency Task Force South (JIATF-South) employs several methods to catch cocaine smuggling into the U.S. via southeastern waters. The JIATF-South works closely with the National Security Agency (NSA), National Reconnaissance Office, and National Geospatial-Intelligence Agency, who have been instrumental in providing imagery intelligence (IMINT) as well as Geospatial Intelligence (GEOINT). These two INTs are extremely crucial to the mission. They provide aerial reconnaissance of incoming nautical traffic. Through Measurement and Signature Intelligence (MASINT) the JIATF-South is able to operate radars to intercept the location of incoming vessels and submerge-vessels. Even though the Central Intelligence Agency (CIA), NSA, National Reconnaissance Office, and National Geospatial-Intelligence Agency have allocated funds and technology for JIATF-South to test (Munsing and Lamb 2011, 35), they are not completely equipped to intercept submarines without completely sinking them (Freedberg 2013).
Counter-narcotics operations on the southwestern border use the same disciplines. IMINT is used to detect the capability of “anomalous cargo container contents such as stowaways, hidden compartments, and contraband. DHS continues to develop imagery technology associated with anomaly detection and reliable target recognition” (White House 2011, 45). MASINT is developed through the use of Portable Ground Penetrating Radar. This technology helps detect subterranean structures like the tunnels Mexican Transnational Criminal Organizations (TCOs) are building (White House 2011, 62). Radar efforts will continue to improve as technology advances. The National Guard State Plans program provides support to counter-narcotics operations by federal, state, and local law enforcement agencies. One of their main missions is to aid in reconnaissance which “provides surface and aerial support. Surface support includes unattended sensor support, listening posts and observation posts using military equipment and ground surveillance radar. Aerial support is performed using both helicopters and fixed-wing aircraft as well as use of unmanned aerial vehicles” (White House 2011, 68). A combination of IMINT and MASINT prove to be extremely essential in counter-narcotic operations.
Reference List
Freedberg, Sydney J. Jr. 2013. Sequester Means $1 Billion More Of Cocaine Floods Into US: Coast Guard. breakingdefense.com, (May 22) http://breakingdefense.com/2013/05/sequester-cuts-will-let-1-million-more-of-cocaine-into-us-coast-guard/ (accessed October 6, 2016)
Munsing, Evan and Christopher J. Lamb. 2011. Joint Interagency Task Force–South: The Best Known, Least Understood.
Angelica LeonCounter-narcotics operations consist of a lot o.docx
1. Angelica Leon
Counter-narcotics operations consist of a lot of different
components. Within these agencies some if not all employ one
or all six intelligence disciplines (INTs) in one way or another.
These INTs enhance counter-narcotics operations. When it
comes to maritime counter-narcotic operations the Joint Inter-
Agency Task Force South (JIATF-South) employs several
methods to catch cocaine smuggling into the U.S. via
southeastern waters. The JIATF-South works closely with the
National Security Agency (NSA), National Reconnaissance
Office, and National Geospatial-Intelligence Agency, who have
been instrumental in providing imagery intelligence (IMINT) as
well as Geospatial Intelligence (GEOINT). These two INTs are
extremely crucial to the mission. They provide aerial
reconnaissance of incoming nautical traffic. Through
Measurement and Signature Intelligence (MASINT) the JIATF-
South is able to operate radars to intercept the location of
incoming vessels and submerge-vessels. Even though the
Central Intelligence Agency (CIA), NSA, National
Reconnaissance Office, and National Geospatial-Intelligence
Agency have allocated funds and technology for JIATF-South to
test (Munsing and Lamb 2011, 35), they are not completely
equipped to intercept submarines without completely sinking
them (Freedberg 2013).
Counter-narcotics operations on the southwestern border use the
same disciplines. IMINT is used to detect the capability of
“anomalous cargo container contents such as stowaways, hidden
compartments, and contraband. DHS continues to develop
imagery technology associated with anomaly detection and
reliable target recognition” (White House 2011, 45). MASINT is
developed through the use of Portable Ground Penetrating
2. Radar. This technology helps detect subterranean structures like
the tunnels Mexican Transnational Criminal Organizations
(TCOs) are building (White House 2011, 62). Radar efforts will
continue to improve as technology advances. The National
Guard State Plans program provides support to counter-
narcotics operations by federal, state, and local law enforcement
agencies. One of their main missions is to aid in reconnaissance
which “provides surface and aerial support. Surface support
includes unattended sensor support, listening posts and
observation posts using military equipment and ground
surveillance radar. Aerial support is performed using both
helicopters and fixed-wing aircraft as well as use of unmanned
aerial vehicles” (White House 2011, 68). A combination of
IMINT and MASINT prove to be extremely essential in counter-
narcotic operations.
Reference List
Freedberg, Sydney J. Jr. 2013. Sequester Means $1 Billion
More Of Cocaine Floods Into US: Coast Guard.
breakingdefense.com, (May 22)
http://breakingdefense.com/2013/05/sequester-cuts-will-let-1-
million-more-of-cocaine-into-us-coast-guard/ (accessed October
6, 2016)
Munsing, Evan and Christopher J. Lamb. 2011. Joint
Interagency Task Force–South: The Best Known, Least
Understood Interagency Success. Institute for National Strategic
StudiesStrategic Perspectives 5, National Defense University
Press Washington, D.C. (June)
https://www.ciaonet.org/attachments/18659/uploads(accessed
October 6, 2016)
The White House. 2011. National Southwest Border
Counternarcotics Strategy. Office of National Drug Control
Policy. https://edge.apus.edu/access/content/group/security-
3. and-global-studies-
common/Intelligence%20Studies/INTL446/Content/Week%205/
SWB_CN_Strategy2011.pdf(accessed October 6, 2016)
Labs/Lab 2.docx
1. Lab 2: Maximum Range of a Projectile
Due at the end of Week 2
· All simulations can be downloaded here, this week's file name
is “ATWOOD MACHINE.ip”.
For Lab 2, please review Chapter 3 in your textbook. This lab
involves a projectile being fired upward at an angle to the
horizontal. You are to program the spreadsheet Excel (a similar
substitute software program is permissible) to determine the
maximum injection angle, that will result in the greatest
downrange distance, R. Assume v = 10 m/s and g is
approximated as g = 10 m/s2. Fill in the data table, and answers
for the blanks and complete the graph (properly labeled and
θmax annotated) in the Lab Answer Sheet at the end of this lab.
{Hint: watch out for conversion problems from radians to
degrees in Excel}.
· Fill in the blanks in the Lab Answer Sheet at the end of this
lab.
· Submit this Lab Answer Sheet when all of the labs are
completed.
· These can be scanned and sent as pdf or picture files (e.g. tif,
gif, etc.) or by any other method of your choice as long as the
Answer Sheets are legible and translatable by Grantham
University faculty.
Access Excel. Your data table will look similar to that found for
Lab 2 below. The injection angle, θ will go from 0 degrees to 90
degrees in steps of two (2) degrees. Once you have the range
formula programmed for θ = use the “fill down” option in
4. Excel to “distribute” the solutions to the other cells for the
other angles. Include your completed full Excel data table with
your Lab Answer Sheet. Then graph the data in order to
construct a R. vs. θ graph. Denote on this graph, the maximum
range, Rmax and the angle, θmax where this occurs. Be sure
that your graph is properly labeled. For Lab 2 return your Lab
Answer Sheet with: (1) completed Excel spreadsheet, and (2)
graph of R vs. θ.
Labs/Lab 3.docx
· Lab 3: Atwood's Machine
Due at the end of Week 3
For Lab 3, please review Chapter 4 in your textbook. Lab 3
involves Atwood’s Machine.
In this simulation is 1.0 kg and is 1.1 kg. Mass rests on the
floor that exerts a normal force, , on ∙ g = ). Then = _____.
· Fill in the blanks in the Lab Answer Sheet at the end of this
lab.
· Submit this Lab Answer Sheet when all of the labs are
completed.
· These can be scanned and sent as pdf or picture files (e.g. tif,
gif, etc.) or by any other method of your choice as long as the
Answer Sheets are legible and translatable by Grantham
University faculty.
Labs/Lab 4.docx
· Lab 4: Roller Coaster & Conservation of Energy
Due at the end of Week 4
For Lab 4, pleae review Chapter 6 in your textbook. This lab
involves a roller coaster and its physics. This simulation can be
downloaded.
In this simulation, an object traverses the “hills and valleys” of
5. a frictionless roller coaster in the realm of zero air resistance.
You will be asked to find measurements and make calculations
concerning total mechanical energy and whether it is conserved.
Then you will then make some changes to the global air
resistance for this simulation and answer the same questions as
you did previously.
· All simulations can be downloaded here, this week's file name
is “BALL ON ROLLER CSTR 4.ip”.
· Fill in the blanks in the Lab Answer Sheet at the end of this
lab.
· Submit this Lab Answer Sheet when all of the labs are
completed.
· These can be scanned and sent as pdf or picture files (e.g. tif,
gif, etc.) or by any other method of your choice as long as the
Answer Sheets are legible and translatable by Grantham
University faculty.
Run the simulation and complete the data tables and fill in the
blanks on the Lab 4 Answer Sheet.
Labs/Lab 5.docx
· Lab 5: Work & Power
Due at the end of Week 5
link media="screen"
href="https://content.grantham.edu/at/Styles/layout.css"
type="text/css" rel="stylesheet" />
In Lab 5, please review Chapter 6. Chapter 6 involves walking
up a flight of stairs and recording your time via a stopwatch or
chronograph. You will be asked to make measurements and
calculations for the total time to work the flight of stairs (at
least 7 steps) and the vertical height of the stairs from the
bottom to the top.
Please Note:There are TWO parts to this lab. The first for
running up several steps, and the second to pretend you kept
running for one hour. Additionally, your answers should be
based on the cost of the runs in terms of ENERGY (KWH) and
6. NOT POWER (kW).
· Fill in the blanks in the Lab Answer Sheet at the end of this
lab.
· Submit this Lab Answer Sheet when all of the labs are
completed.
· These can be scanned and sent as pdf or picture files (e.g. tif,
gif, etc.) or by any other method of your choice as long as the
Answer Sheets are legible and translatable by Grantham
University faculty.
The lab details follow:
Purpose:Determine your work and power as you climb a flight
of stairs.
Materials:Yardstick, a stopwatch or digital/analog watch,
bathroom scale, calculator, and you, the climber
Procedure:
· Estimate your mass in kg (Hint: 1 kg (mass) = 2.2 pounds
(weight)).
· You should approach the bottom step of the stairs with a
steady speed.
· You are to start the time as you reach the first stair and stop
the clock when you reach the top
Observations and Data:
· Calculate the work and power for you to climb the flight of
stairs
· Work (you) = _____; power (you) = ________
· Calculate your power in kilowatts: (P(kW) = _____.
Application:
· Your local electric company supplies you with 1 kW of power
for 1 hour for 8 cents. Assume that you could climb these stairs
continuously for 1 hour. How much money would this climb be
worth? $_________.
· Transfer all answers to the Lab 4 Answer sheet.
Labs/Lab 6.docx
· Lab 6: Ballistic Pendulum
7. Due at the end of Week 6
For Lab 6, please review Chapter 7 in your textbook. Week 6
involves the ballistic pendulum.
In this simulation, an object (the projectile) strikes and becomes
embedded in a block of wood suspended from the ceiling by two
strings of negligible mass. You will be asked to read the
measurement tables and make calculations concerning total
mechanical energy and momentum (energy and momentum are
conserved since friction and air resistance are absent). These
measurements will result in the determination of the initial
velocity of the projectile (actually the initial velocity and the
velocity upon impact are identical).
Run the simulation and fill in the blanks below and copy over to
the Lab 6 Answer Sheet. Find the time, t, that the bullet
embedded in the block of wood reaches its maximum height. T
= _____.
Q. If h = Δy = yf – yi, where h is the change in the height of the
block at equilibrium to its maximum height, from the position
measurement table h. h = ____________.
Q. Calculate the velocity of the bullet: v = _________.
· All simulations can be downloaded here, this week's file name
is “BALLISTIC PENDULUM PO.ip”.
· Fill in the blanks in the Lab Answer Sheet at the end of this
lab.
· Submit this Lab Answer Sheet when all of the labs are
completed.
· These can be scanned and sent as pdf or picture files (e.g. tif,
gif, etc.) or by any other method of your choice as long as the
Answer Sheets are legible and translatable by Grantham
University faculty.
Labs/Lab 7.docx
· Lab 7: Wave Characteristics
Due at the end of Week 7
For Lab 7, please review Chapter 11 in your textbook. Week 7
8. invoices the wave characteristics analysis of two periodic
cosine waves – one red and the other blue.
Run the simulation. You will use the data from the “Time” and
“position” measurement tables to help fill in the wave
characteristics blanks on the Lab Answer Sheet.
· All simulations can be downloaded here, this week's file name
is “EXP #7 B4.ip”.
· Fill in the blanks in the Lab Answer Sheet at the end of this
lab.
· Submit this Lab Answer Sheet when all of the labs are
completed.
· These can be scanned and sent as pdf or picture files (e.g. tif,
gif, etc.) or by any other method of your choice as long as the
Answer Sheets are legible and translatable by Grantham
University faculty.
Labs/Lab 8.docx
· Lab 8: Thermodynamics
Due at the end of Week 8
Lab 8 involves using thermodynamics to calculate the work
done in specific processes and the use this to determine the
change in internal energy or the heat transfer via the first law of
thermodynamics (ΔE = Q – W).
First start with an isothermal expansion at 2.0 atm from 1.0 L to
4.0 L. An isothermal process means the temperature of a system
is constant and there is no internal energy change of the system.
The formula describing an isothermal process is W = P*V(0) *
ln(V(f)/V(0. (The proof of this formula comes from calculus and
will not be shown here). A diagram of an isothermal process can
be found in the textbook in Chapter 15.
If this system in now is adiabatically compressed back to its
original volume, what is the change in internal energy here?
Also what are some examples of both of these processes in the
everyday world?
9. Jonathan Vest
There are varying methods on collecting intelligence and
depending on the operation, one method may yield more
information than another. Information is collected through
either Human Intelligence (HUMINT), Signal Intelligence
(SIGINT), Measurement and Signature Intelligence (MASINT),
Geospatial Intelligence (GEOINT), or Open-source Intelligence
(OSINT). When looking at the U.S. counter-narcotics mission
all of these forms of intelligence collection serve a purpose,
however, depending on specific operational goals one form of
collection may be better suited. I believe that the most
information can be collected when utilizing all of these
disciplines together. For instance, a HUMINT source can
provide you with information on the general area of a
cultivation site. That information combined with IMINT can
lead U.S. agencies to the precise grid of the cultivation site.
With that being said, I believe HUMINT can provide the most
information by itself. Having HUMINT assets within a
particular DTO, can provide drug production sites, cultivation
sites, routines, drop sites for both money and drugs, trafficking
routes, names, dates, and more. Most of that information can
only be obtained through HUMINT sources. IMINIT and
GEOINT only provide imagery, which although is very useful,
its only effective if you know the general area you need to look
at. SIGINT is another effective form of intelligence collection,
but not all information from DTOs is passed via communication
devices. Information such as drop dates and times, is often
passed face to face. This is the same problem with OSINT.
DTOs understand that information transmitted via
communication devices and social media can potentially be
intercepted by law enforcement agencies. Overall intelligence
collection disciplines work best when used together. However,
10. my personal opinion is that HUMINT, when used properly, can
yield the most information by developing a network of
informants at different levels within a DTO.
Works Cited
Office of National Drug Control Policy. National Southwest
Border Counternarcotics Strategy. 2011.
https://www.whitehouse.gov/sites/default/files/ondcp/policy-
and-research/swb_counternarcotics_strategy11.pdf
Marissa Austin
The U.S government has employed stringed measures to curb
the growing Narcotic industry that proves to be a global threat
to societal growth. It has set up organizations that are involved
in counter-drug operations, which include the detection,
interdiction, disruption, and destruction of illicit substances and
the drug-trafficking infrastructure (Giermanski, 2010). Despite
these several agencies across the world, I believe the
Department of Homeland Security has been the most effective
in its involvement in counter drug operation in the local
surrounding and internationally. With its Counternarcotic
Doctrine signed by Secretary Janet Napolitano on 27th October
2010 the department has dedicated its supremacy effort to keep
the streets drug free (Giermanski, 2010). The doctrine which
stated that the agency will develop and maintain a
comprehensive view of illicit drug trafficking industry,
establish effective arrays of counternarcotic forces to counter
threats and to collaborate with other federal, states, locals, and
tribal partners has remained strong in upholding their
principles (Giermanski, 2010).
11. The National level imagery assets that are able to obtain
important information to support this mission has produced
great results (Giermanski, 2010). The well-trained and skillful
personnel employed must be knowledgeable about the illicit
drug activities as indicators alters over time and drug operators
changes their strategies in order to avoid detection. Indicators
also differ by geographic area. For instance, illicit crop patterns
may vary by nations depending on legality of the crop’s
cultivation.
It has been a common assumption mostly acknowledged by
Mexican drug cartels that local US law enforcement may be
compromised by corrupt law enforcement personnel in the US-
border sheriff and city law enforcement departments who are
working with the cartels (Giermanski, 2010). However, the DHS
transparency in their operations has been at the apex of their
values and I strongly believe it is the most effective agency.
Reference
Giermanski, Jim. DHS and Its Counternarcotic Doctrine.
Homeland security today.U.S. 2010.
Retrieved from 30th September 2016.
http://www.hstoday.us/columns/guest-commentaries/blog/dhs-
and-its-
counternarcoticsdoctrine/2e375cb49baf75e763a87d444220f247.
html