SlideShare a Scribd company logo
1 of 4
Amanda Kaster
English Technical Writing
Amber Welch
August 31, 2016
Audience analysis- Government Intelligence
Government Intelligence has 17 different organizations in which they all play a different
role to protect the United States of America against foreign enemies. These organizations range
in vast areas of foreign and domestic terrorist, major foreign drug trafficking, technology threats,
nuclear proliferation, financing and several other job duties. The Office of the Director of
National Intelligence (ODNI) is one of the 17 organizations that has a large number jobs
available. One of the key occupations is Infor Sharing and Safeguarding Officer; this is a DoD
(Department of Defense) position. Meaning government-civilian employment at a level of GS-
13. To be eligible for this position individuals need to have experience in government
intelligence, for example, Military or FBI (intelligence agency at a lower level). They must also
be efficient in organization and implementing information sharing plans and programs (United
States ICC, N.D.). The ability to communicate, analyze, perform assignments and develop loyal
relationships. Info Sharing and Safeguarding employees use these skills to provide new and
improved procedures in keeping confidential information secure.
ODNI has many conferences and meetings with all other intelligence agencies to pass
important information securely. Info Sharing and Safeguarding personnel organizes these
meetings and must communicate all new information found and all program changes that will
take place. This is very important to those attending the meeting due to technical equipment and
terrorist hackers. Once all information is presented, they will all provide their opinion over which
is the best procedures for the next year. Those at the meeting will include Directors and
presidents of each government intelligence organization along with Info Sharing and
Safeguarding supervisors. Once everyone shares the needed information, Info Sharing and
Safeguarding will use the decided information into action.
These meetings are very important and work in a pyramid formation. The conference
starts with the directors of all the different organizations and then go to secondary employees and
lastly, to external audiences. The directors will provide all information and make all decisions,
then the secondary audiences or employees under the directors than will have to organize the
new decisions and execute. External audiences are those that have no choice but to follow the
new procedures. This would be the everyday citizens of America. This is of important to the
secondary audience and the external audience for many reasons. The secondary audience must
understand and obeyed by the needed tasks in order for the tasks to be done efficiently and
properly. Which then falls to the external audiences, civilians. Many civilians don’t know or
believe this information is important to them, but it is! Civilians must trust and agree with the
decisions chosen for national security. They must believe that they will be safe and information
will be secured from foreign and domestic terrorists.
Secondary audiences have an educational background. They all must pertain a college
major in the fields they all work in specifically. For example, those that work in technical threats
will have a criminology and/or a technology degree; those employed in nuclear proliferation will
have a science major or a masters; those functioning in finance will have a business and an
accountant major. The external audience is the most difficult, they come from a variety of
backgrounds. Some with college education and others with a GED or very little education. In
order for everyone to receive information and understand, directors provide speeches on the
News channels and live television so that all United States civilians will understand the process,
but without giving away any important information. When passing along information to all the
different branches, Info Sharing and Safeguarding must consider the different ethnical, social,
and cultural differences. If providing information in a way that may affect these differences,
many individuals could possibly become resistant and lose trust in the Government National
Security.
This process sounds very well thought out and simple, but many mistakes can happen
using the pyramid formation. A successful endeavor would be that everyone is happy with the
decisions made and understand the process, how to achieve the goals, and the decision made
works better than the old method. With a failed attempt, Info Sharing and Safeguarding will see
many people making mistakes on the new method, employees of all organizations don’t
understand how to create the process and don’t understand. Lastly, if there was a failed attempt
than classified information will be seen by the public or terrorist resulting in United states
citizens losing trust in the government protecting their safety.
This document is purposeful and knowledgeable, the information provided will create a
better understanding to the process of National Security and what is needed to keep America
safe. This will allow individuals to understand the roles and job duties to Info Sharing and
Safeguarding at the ODNI. The document presented is of significance meaning to secondary and
external audiences because it explains the procedures and regulations of all Government
Intelligence organizations, particularly pertaining to Info Sharing and Safeguarding. Agreeing
and understanding the information provided, employees can keep United States of America safe
and will insure citizens to trust and appreciate the government strong effort in keeping them
protected.
References
Member Agencies. (n.d.). Retrieved August 28, 2016, from
https://www.intelligencecareers.gov/icmembers.html
https://www.dni.gov/files/documents/jobs/26421.pdf

More Related Content

Viewers also liked

Resumen La odisea de la plata española de Cipolla
Resumen La odisea de la plata española de CipollaResumen La odisea de la plata española de Cipolla
Resumen La odisea de la plata española de CipollaCarlos antonio Perez
 
Referral Strategies: not just a numbers game
Referral Strategies: not just a numbers gameReferral Strategies: not just a numbers game
Referral Strategies: not just a numbers gameSomething Big
 
05. update from dec 2015 regional evet
05. update from dec 2015 regional evet05. update from dec 2015 regional evet
05. update from dec 2015 regional evetNHS England
 
Andrea
AndreaAndrea
Andreay1j2
 
CV Carlos Navarro 03112016
CV Carlos Navarro 03112016CV Carlos Navarro 03112016
CV Carlos Navarro 03112016Carlos Navarro
 
Trabajo cultura ciudadana. sindy delgado
Trabajo cultura ciudadana. sindy delgadoTrabajo cultura ciudadana. sindy delgado
Trabajo cultura ciudadana. sindy delgadosindydelgado220102
 
تاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتی
تاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتیتاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتی
تاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتیShadi Azimi Gohar
 
Ken Hoffman Corp Trust 11-22-16
Ken Hoffman Corp Trust 11-22-16Ken Hoffman Corp Trust 11-22-16
Ken Hoffman Corp Trust 11-22-16Kenneth Hoffman
 

Viewers also liked (13)

Resumen La odisea de la plata española de Cipolla
Resumen La odisea de la plata española de CipollaResumen La odisea de la plata española de Cipolla
Resumen La odisea de la plata española de Cipolla
 
Proyecto normas icontec
Proyecto normas icontecProyecto normas icontec
Proyecto normas icontec
 
Referral Strategies: not just a numbers game
Referral Strategies: not just a numbers gameReferral Strategies: not just a numbers game
Referral Strategies: not just a numbers game
 
05. update from dec 2015 regional evet
05. update from dec 2015 regional evet05. update from dec 2015 regional evet
05. update from dec 2015 regional evet
 
Andrea
AndreaAndrea
Andrea
 
CV Carlos Navarro 03112016
CV Carlos Navarro 03112016CV Carlos Navarro 03112016
CV Carlos Navarro 03112016
 
Trabajo cultura ciudadana. sindy delgado
Trabajo cultura ciudadana. sindy delgadoTrabajo cultura ciudadana. sindy delgado
Trabajo cultura ciudadana. sindy delgado
 
Metodos antikonceptivos
Metodos antikonceptivosMetodos antikonceptivos
Metodos antikonceptivos
 
تاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتی
تاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتیتاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتی
تاثیر صدا در معماری و عملکرد فضایی از دیدگاه مبانی معرفتی
 
Ken Hoffman Corp Trust 11-22-16
Ken Hoffman Corp Trust 11-22-16Ken Hoffman Corp Trust 11-22-16
Ken Hoffman Corp Trust 11-22-16
 
Descentralizacion
DescentralizacionDescentralizacion
Descentralizacion
 
Gordon Akinpelu
Gordon AkinpeluGordon Akinpelu
Gordon Akinpelu
 
Computador
ComputadorComputador
Computador
 

Similar to Amanda Kaster-audience analysis complete paper

Government security classifications e learning
Government security classifications e learningGovernment security classifications e learning
Government security classifications e learningaccystanley
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable InformationToya Shamberger
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxhanneloremccaffery
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docxgidmanmary
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity BattleGovLoop
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipSloane Joie Trugman
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019Martin Cerny
 

Similar to Amanda Kaster-audience analysis complete paper (16)

Government security classifications e learning
Government security classifications e learningGovernment security classifications e learning
Government security classifications e learning
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docx
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Cogniware 2019
Cogniware 2019Cogniware 2019
Cogniware 2019
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019
 
The Power of Identity
The Power of IdentityThe Power of Identity
The Power of Identity
 

More from amanda Kaster

Amanda Kaster website analysis
Amanda Kaster website analysisAmanda Kaster website analysis
Amanda Kaster website analysisamanda Kaster
 
Amanda Kaste english report audiences
Amanda Kaste english report audiencesAmanda Kaste english report audiences
Amanda Kaste english report audiencesamanda Kaster
 
AMANDA KASTER- english report
AMANDA KASTER- english reportAMANDA KASTER- english report
AMANDA KASTER- english reportamanda Kaster
 
Amanda Kaster english- instructions manual
Amanda Kaster english- instructions manualAmanda Kaster english- instructions manual
Amanda Kaster english- instructions manualamanda Kaster
 
Amanda Kaster creating definitions
Amanda Kaster creating definitionsAmanda Kaster creating definitions
Amanda Kaster creating definitionsamanda Kaster
 
Assignment - Evaluating Proposals
Assignment - Evaluating ProposalsAssignment - Evaluating Proposals
Assignment - Evaluating Proposalsamanda Kaster
 
Kaster internship resume
Kaster internship resumeKaster internship resume
Kaster internship resumeamanda Kaster
 

More from amanda Kaster (9)

Reflection
ReflectionReflection
Reflection
 
turtle brocher
turtle brocherturtle brocher
turtle brocher
 
Amanda Kaster website analysis
Amanda Kaster website analysisAmanda Kaster website analysis
Amanda Kaster website analysis
 
Amanda Kaste english report audiences
Amanda Kaste english report audiencesAmanda Kaste english report audiences
Amanda Kaste english report audiences
 
AMANDA KASTER- english report
AMANDA KASTER- english reportAMANDA KASTER- english report
AMANDA KASTER- english report
 
Amanda Kaster english- instructions manual
Amanda Kaster english- instructions manualAmanda Kaster english- instructions manual
Amanda Kaster english- instructions manual
 
Amanda Kaster creating definitions
Amanda Kaster creating definitionsAmanda Kaster creating definitions
Amanda Kaster creating definitions
 
Assignment - Evaluating Proposals
Assignment - Evaluating ProposalsAssignment - Evaluating Proposals
Assignment - Evaluating Proposals
 
Kaster internship resume
Kaster internship resumeKaster internship resume
Kaster internship resume
 

Amanda Kaster-audience analysis complete paper

  • 1. Amanda Kaster English Technical Writing Amber Welch August 31, 2016 Audience analysis- Government Intelligence Government Intelligence has 17 different organizations in which they all play a different role to protect the United States of America against foreign enemies. These organizations range in vast areas of foreign and domestic terrorist, major foreign drug trafficking, technology threats, nuclear proliferation, financing and several other job duties. The Office of the Director of National Intelligence (ODNI) is one of the 17 organizations that has a large number jobs available. One of the key occupations is Infor Sharing and Safeguarding Officer; this is a DoD (Department of Defense) position. Meaning government-civilian employment at a level of GS- 13. To be eligible for this position individuals need to have experience in government intelligence, for example, Military or FBI (intelligence agency at a lower level). They must also be efficient in organization and implementing information sharing plans and programs (United States ICC, N.D.). The ability to communicate, analyze, perform assignments and develop loyal relationships. Info Sharing and Safeguarding employees use these skills to provide new and improved procedures in keeping confidential information secure. ODNI has many conferences and meetings with all other intelligence agencies to pass important information securely. Info Sharing and Safeguarding personnel organizes these meetings and must communicate all new information found and all program changes that will take place. This is very important to those attending the meeting due to technical equipment and terrorist hackers. Once all information is presented, they will all provide their opinion over which is the best procedures for the next year. Those at the meeting will include Directors and
  • 2. presidents of each government intelligence organization along with Info Sharing and Safeguarding supervisors. Once everyone shares the needed information, Info Sharing and Safeguarding will use the decided information into action. These meetings are very important and work in a pyramid formation. The conference starts with the directors of all the different organizations and then go to secondary employees and lastly, to external audiences. The directors will provide all information and make all decisions, then the secondary audiences or employees under the directors than will have to organize the new decisions and execute. External audiences are those that have no choice but to follow the new procedures. This would be the everyday citizens of America. This is of important to the secondary audience and the external audience for many reasons. The secondary audience must understand and obeyed by the needed tasks in order for the tasks to be done efficiently and properly. Which then falls to the external audiences, civilians. Many civilians don’t know or believe this information is important to them, but it is! Civilians must trust and agree with the decisions chosen for national security. They must believe that they will be safe and information will be secured from foreign and domestic terrorists. Secondary audiences have an educational background. They all must pertain a college major in the fields they all work in specifically. For example, those that work in technical threats will have a criminology and/or a technology degree; those employed in nuclear proliferation will have a science major or a masters; those functioning in finance will have a business and an accountant major. The external audience is the most difficult, they come from a variety of backgrounds. Some with college education and others with a GED or very little education. In order for everyone to receive information and understand, directors provide speeches on the News channels and live television so that all United States civilians will understand the process,
  • 3. but without giving away any important information. When passing along information to all the different branches, Info Sharing and Safeguarding must consider the different ethnical, social, and cultural differences. If providing information in a way that may affect these differences, many individuals could possibly become resistant and lose trust in the Government National Security. This process sounds very well thought out and simple, but many mistakes can happen using the pyramid formation. A successful endeavor would be that everyone is happy with the decisions made and understand the process, how to achieve the goals, and the decision made works better than the old method. With a failed attempt, Info Sharing and Safeguarding will see many people making mistakes on the new method, employees of all organizations don’t understand how to create the process and don’t understand. Lastly, if there was a failed attempt than classified information will be seen by the public or terrorist resulting in United states citizens losing trust in the government protecting their safety. This document is purposeful and knowledgeable, the information provided will create a better understanding to the process of National Security and what is needed to keep America safe. This will allow individuals to understand the roles and job duties to Info Sharing and Safeguarding at the ODNI. The document presented is of significance meaning to secondary and external audiences because it explains the procedures and regulations of all Government Intelligence organizations, particularly pertaining to Info Sharing and Safeguarding. Agreeing and understanding the information provided, employees can keep United States of America safe and will insure citizens to trust and appreciate the government strong effort in keeping them protected.
  • 4. References Member Agencies. (n.d.). Retrieved August 28, 2016, from https://www.intelligencecareers.gov/icmembers.html https://www.dni.gov/files/documents/jobs/26421.pdf