SlideShare a Scribd company logo
400 words
Primary Task Response
: Your first task is to post your own Key Assignment Outline to
the Discussion Board so that other students are able to review
your plan. Attach your document to the main post, and include
any notes that you feel are appropriate. The purpose of this
assignment is to help improve the quality of the Key
Assignment Draft you will complete next week.
Part 1
Open-source intelligence (OSINT) is all information that can be
acquired from overt collection from all types of media and
government reports, various organizations, and through the use
of the Internet. Discuss the following:
What are the pros and cons of OSINT?
Include a short assessment of how OSINT relates to other
sources of intelligence, such as human intelligence (HUMINT),
signal intelligence (SIGINT), image intelligence (IMINT), and
measurements and signature intelligence (MASINT).
Part 2
The ever-expanding intelligence community (IC) includes many
new disciplines other than law enforcement, such as fire and
emergency medical services (EMS). Discuss the following:
Define what the emerging IC means to you.
Select 2 homeland security (HLS) and public safety disciplines,
and explain how those disciplines can play a role within the
emerging IC and overall information sharing.
Discuss the emerging IC as it relates to a multidiscipline
approach.
Are there expanding intelligence needs? If so, in what areas?
Part 3
Post your Key Assignment Outline to the discussion area so that
other students are able to review your plan. Attach your
document to the main discussion post, and include any notes
you feel are appropriate. The purpose of this assignment is to
help improve the quality of the Key Assignment Draft you will
complete next week.

More Related Content

Similar to 400 wordsPrimary Task Response Your first task is to post you.docx

Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
iosrjce
 
Length1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docxLength1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docx
jesseniasaddler
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
Government
 
Final Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docxFinal Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docx
write22
 
What really is Artificial Intelligence about?
What really is Artificial Intelligence about? What really is Artificial Intelligence about?
What really is Artificial Intelligence about?
Harmony Kwawu
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
Lilminow
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
Eliahu (Eli) Assif (Amar)
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
eraser Juan José Calderón
 
Click on the following link(s) for the Phase 2 Reading Assignment.docx
Click on the following link(s) for the Phase 2 Reading Assignment.docxClick on the following link(s) for the Phase 2 Reading Assignment.docx
Click on the following link(s) for the Phase 2 Reading Assignment.docx
drennanmicah
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
Asst.prof M.Gokilavani
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
Asst.prof M.Gokilavani
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
Pavlos Isaris
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
Jonathan Sinclair
 
Hacking for ICE (Internal Controls Evaluation)
Hacking for ICE (Internal Controls Evaluation)Hacking for ICE (Internal Controls Evaluation)
Hacking for ICE (Internal Controls Evaluation)
Kenneth Dorado, CISA, HCISPP
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
ingenioustech
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
annrodgerson
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
FIA2010
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
Stephen Cobb
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
LizbethQuinonez813
 
This week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many attaThis week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many atta
rochellwa9f
 

Similar to 400 wordsPrimary Task Response Your first task is to post you.docx (20)

Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
Length1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docxLength1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docx
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Final Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docxFinal Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docx
 
What really is Artificial Intelligence about?
What really is Artificial Intelligence about? What really is Artificial Intelligence about?
What really is Artificial Intelligence about?
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
 
Click on the following link(s) for the Phase 2 Reading Assignment.docx
Click on the following link(s) for the Phase 2 Reading Assignment.docxClick on the following link(s) for the Phase 2 Reading Assignment.docx
Click on the following link(s) for the Phase 2 Reading Assignment.docx
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Hacking for ICE (Internal Controls Evaluation)
Hacking for ICE (Internal Controls Evaluation)Hacking for ICE (Internal Controls Evaluation)
Hacking for ICE (Internal Controls Evaluation)
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
This week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many attaThis week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many atta
 

More from taishao1

9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx
taishao1
 
a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docx
taishao1
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docx
taishao1
 
A case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docxA case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docx
taishao1
 
A 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docxA 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docx
taishao1
 
a 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docxa 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docx
taishao1
 
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docxA - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
taishao1
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
taishao1
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
taishao1
 
875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx
taishao1
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx
taishao1
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
taishao1
 
8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx
taishao1
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx
taishao1
 
8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx
taishao1
 
8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx
taishao1
 
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
taishao1
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
taishao1
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docx
taishao1
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
taishao1
 

More from taishao1 (20)

9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx
 
a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docx
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docx
 
A case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docxA case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docx
 
A 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docxA 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docx
 
a 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docxa 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docx
 
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docxA - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
 
875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
 
8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx
 
8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx
 
8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx
 
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docx
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

400 wordsPrimary Task Response Your first task is to post you.docx

  • 1. 400 words Primary Task Response : Your first task is to post your own Key Assignment Outline to the Discussion Board so that other students are able to review your plan. Attach your document to the main post, and include any notes that you feel are appropriate. The purpose of this assignment is to help improve the quality of the Key Assignment Draft you will complete next week. Part 1 Open-source intelligence (OSINT) is all information that can be acquired from overt collection from all types of media and government reports, various organizations, and through the use of the Internet. Discuss the following: What are the pros and cons of OSINT? Include a short assessment of how OSINT relates to other sources of intelligence, such as human intelligence (HUMINT), signal intelligence (SIGINT), image intelligence (IMINT), and measurements and signature intelligence (MASINT). Part 2 The ever-expanding intelligence community (IC) includes many new disciplines other than law enforcement, such as fire and emergency medical services (EMS). Discuss the following: Define what the emerging IC means to you.
  • 2. Select 2 homeland security (HLS) and public safety disciplines, and explain how those disciplines can play a role within the emerging IC and overall information sharing. Discuss the emerging IC as it relates to a multidiscipline approach. Are there expanding intelligence needs? If so, in what areas? Part 3 Post your Key Assignment Outline to the discussion area so that other students are able to review your plan. Attach your document to the main discussion post, and include any notes you feel are appropriate. The purpose of this assignment is to help improve the quality of the Key Assignment Draft you will complete next week.