This document discusses the importance of human intelligence (HUMINT) in addressing current and future national security threats. It argues that while all intelligence methods have value, HUMINT is uniquely equipped to reveal adversaries' intentions and plans. The document cites examples from the Cold War and War on Terror to show how HUMINT has provided critical information to policymakers. It recommends making HUMINT a central focus of intelligence gathering efforts to confront threats like terrorism and a potential nuclear Iran. However, it acknowledges all intelligence methods should be utilized together to develop a complete picture.
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
Running head: ISOL 534 – Application Security 1
Running head: ISOL 534 – Application Security 2
Week-2 Research Paper Topic
Name: Nikhil Vasani
Course: ISOL-534
Professor: Dr. Jerry Alsay
University of the Cumberland
May 23, 2019
Introduction
The topic of security has been an issue for many countries and citizens alike as countries struggle to root out the vice of insecurity that is posing a great threat especially during this technological era where everything is virtually done online. Today every country around the world is grappling with keeping its citizens and institutions safe from external attacks and threats. Some of these threats could be motivated by various factors ranging from political, economic and social issues which make individuals or groups plan some sort of leveling score mission. If we were to review history in the early days during the 17th and 18th century the issues of insecurity among various nations were in existence but not at the height it is in the wake of the 21st century. Those days’ strategic alliances worked best in culminating threats of external and internal invasion, various leaders would call for peaceful resolution of the indifference that might exist between or among groups of nations. The mode or means of attack was not as sophisticated as it today since the only way terrorists would invade empires those days were through the physical means of actually leading an invasion group or plotting with a team on the ground to execute their plan.
Today this tactic has changed leaving institutions mandated with protecting our boundaries and keeping the people safe with a huge task of coming up with various ways of knowing how, where and when the security threats might actually occur. Some of the world leading security institutions that have earned a name for themselves are the homeland security, the Federal Bureau of Investigation FBI and Scotland Yard. These institutions have in the recent past prevented so many attacks plotted against the United States of America and many countries around the world through tapping the wide insecurity network around the world.
Background research
The issue of terrorism and external attacks has led to numerous loss of lives and property and must be cubed and properly managed using the most efficient methods so as to ensure proper security. It is evident that terrorists no longer use outdated strategies while carrying out attacks. With technology evolving with time, they have learned and mastered the use of new technology and have succeeded in coming up with some of the toughest attacks to prevent. Therefore, the DHS is left with a tough task and must improvise some of the best tactics in their strategic plan so as to have a proper chance in managing the situation. The intelligent gathering is one of the best elements that can be applied by the DHS in order to come up with the right solutions that will stop or prevent external attacks and terrorism.
In this research paper, I attempt to construct a consistent, malleable conceptualization of the contemporary drone. I draw on a wide variety of academic papers, articles, opinion pieces, and sources - The Intercept, Donna Harraway in the Feminist Studies journal, Pew Research Center etc.
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
Running head: ISOL 534 – Application Security 1
Running head: ISOL 534 – Application Security 2
Week-2 Research Paper Topic
Name: Nikhil Vasani
Course: ISOL-534
Professor: Dr. Jerry Alsay
University of the Cumberland
May 23, 2019
Introduction
The topic of security has been an issue for many countries and citizens alike as countries struggle to root out the vice of insecurity that is posing a great threat especially during this technological era where everything is virtually done online. Today every country around the world is grappling with keeping its citizens and institutions safe from external attacks and threats. Some of these threats could be motivated by various factors ranging from political, economic and social issues which make individuals or groups plan some sort of leveling score mission. If we were to review history in the early days during the 17th and 18th century the issues of insecurity among various nations were in existence but not at the height it is in the wake of the 21st century. Those days’ strategic alliances worked best in culminating threats of external and internal invasion, various leaders would call for peaceful resolution of the indifference that might exist between or among groups of nations. The mode or means of attack was not as sophisticated as it today since the only way terrorists would invade empires those days were through the physical means of actually leading an invasion group or plotting with a team on the ground to execute their plan.
Today this tactic has changed leaving institutions mandated with protecting our boundaries and keeping the people safe with a huge task of coming up with various ways of knowing how, where and when the security threats might actually occur. Some of the world leading security institutions that have earned a name for themselves are the homeland security, the Federal Bureau of Investigation FBI and Scotland Yard. These institutions have in the recent past prevented so many attacks plotted against the United States of America and many countries around the world through tapping the wide insecurity network around the world.
Background research
The issue of terrorism and external attacks has led to numerous loss of lives and property and must be cubed and properly managed using the most efficient methods so as to ensure proper security. It is evident that terrorists no longer use outdated strategies while carrying out attacks. With technology evolving with time, they have learned and mastered the use of new technology and have succeeded in coming up with some of the toughest attacks to prevent. Therefore, the DHS is left with a tough task and must improvise some of the best tactics in their strategic plan so as to have a proper chance in managing the situation. The intelligent gathering is one of the best elements that can be applied by the DHS in order to come up with the right solutions that will stop or prevent external attacks and terrorism.
In this research paper, I attempt to construct a consistent, malleable conceptualization of the contemporary drone. I draw on a wide variety of academic papers, articles, opinion pieces, and sources - The Intercept, Donna Harraway in the Feminist Studies journal, Pew Research Center etc.
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
According to the text, crime has been part of the human condition since people began to live in groups. Ancient documents indicate that conduct we now call murder, theft, or robbery was identified as criminal by civilizations that existed thousands of years ago. Criminal laws regulate human conduct and tell people what they can and cannot do and, in some instances, what they must do under certain circumstances. In this assignment, you will explore different types of criminal conduct and the goals of criminal law.
Write a four to six (4-6) page paper in which you:
Determine whether or not the Ex Post Facto Clause can be used as a defense to prohibit the increase in federal minimum/mandatory sentencing guidelines after a federal defendant has committed the crime. Provide a rationale to support your position.
Explain the distinction between criminal, tort, and moral wrongs. Next, support or criticize the premise that the standards set by moral laws are higher than those set by criminal law.
Identify and discuss the differences between solicitation of another to commit a crime and a conspiracy to commit a crime. Next, support or criticize the use of the unilateral approach to conspiracy convictions.
Identify the four (4) goals of criminal law, and discuss the manner in which these four goals effectuate the purpose of protecting the public and preventing the conviction of innocent persons.
Use at least three (3) quality academic resources in this assignment.
Note:
Wikipedia and similar types of websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
This course requires use of new
Strayer Writing Standards (SWS
). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the nature and history of American criminal law.
Explain the role of individuals and federal, state, and local government agencies in crime fighting and prosecution of criminal offenses.
Analyze the essential legal elements of criminal conduct.
Use technology and information resources to research issues in criminal law.
Write clearly and concisely about criminal law using proper writing mechanics.
.
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
According to Ronald Story and Bruce Laurie, “The dozen years between 1968 and 1980 marked more than the beginning of Republican ascendency; they also saw the breakup of the New Deal coalition and the advent of conservative domination of American politics.” (CP 139).
In this essay, you should explain,
first
, how it is that conservatives came to dominate American politics by the 1980s and,
second
,
how the ideas and policies they embraced shaped American society into the twenty first century.
Rules:
1. 3-4 pages
2. Double spaced, 12-point font
3. Standard margins—Approximately 1.25 on left and right margins and 1 on top and bottom
4. In crafting your essay, you will want to construct a clear thesis and draw on evidence from the sources described below.
5.
Only
use these sources below.
Sources:
Context: The Close of the 1960s
1. The black cat tavern and the LGBT Movement
Link:
https://www.npr.org/2017/02/13/514935126/stonewall-riots-grab-the-spotlight-from-black-cat-protests
2. ESPN Sport center on Katherine Switzwer
Link:
https://www.youtube.com/watch?v=U6CoScOIK_I
3. Crisis in the Cities and 1968.pdf (attachment)
4. Excerpt from MLK’s final Speech in 1968
Link:
https://www.youtube.com/watch?v=Oehry1JC9Rk
5. Vietnam-The path to war.pdf (attachment)
The Rediscovery of the Market: Conservative Politics and Policies
6. Alfred Kahn’s Legacy: Cheap Flights
Link:
https://www.npr.org/2010/12/29/132422495/alfred-kahns-legacy-cheap-flights
7. A Second Gilded Age?.pdf (attachment)
.
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
According to Kirk (2016), most of your time will be spent work with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
.
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation.
Walden’s MSW program expects students in their specialization year to be able to:
Evaluate the implication of policies and policy change in the lives of clients/constituents.
Demonstrate critical thinking skills that can be used to inform policymakers and influence policies that impact clients/constituents and services.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare
: Working with your field instructor, identify a social problem that is common among the organization (or its clients) and research current policies at that state and federal levels that impact the social problem. Then, from a position of advocacy, identify methods to address the social problem (i.e., how you, as a social worker, and the agency advocate to change the problem). You are expected to specifically address how both you and the agency can effectively engage policy makers to make them aware of the social problem and the impact that the policies have on the agency and clients.
The Assignment (2-3 pages): Social Problems is Ex-cons finding Jobs Opportunities in State of California. The Agency is Called "Manifest" the website is Manifest.org
Identify the social problem
Explain rational for selecting social problem
Describe state and federal policies that impact the social problem
Identify specific methods to address the social problems
Explain how the agency and student can advocate to change the social problem
You are expected to present and discuss this assignment with your agency Field Instructor. Your field instructor will be evaluating your ability to demonstrate this competency in their field evaluation. In addition, you will submit this assignment for classroom credit. The Field Liaison will grade the assignment “PASS/FAIL,” see rubric for passing criteria.
.
According to Kirk (2016), most of our time will be spent working.docxaryan532920
According to Kirk (2016), most of our time will be spent working with our data. The four following group actions were mentioned by Kirk (2016):
Book: Kirk, A. (2016). Data visualisation a handbook for data driven design. Los Angeles, CA: Sage.
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
According to Davenport (2014) the organizational value of healthcare analytics, both determination and importance, provide a potential increase in annual revenue and ROI based on the value and use of analytics. To complete this assignment, research and evaluate the challenges faced in the implementation of healthcare analytics in the Health Care Organization (HCO) or health care industry using the following tools:
The paper must also address the following:
Application of PICO (problem, intervention, comparison group, and outcomes) to the challenge identified in your research.
The paper:
Must be two to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the
Ashford Writing Center. (Links to an external site.)
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly sources in addition to the course text.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
.
According to the authors, privacy and security go hand in hand; .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
Q: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
.
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and its input and possible output processes.
Briefly explain what the simulation modeling relies upon?
-500 words at least.
-No Plagiarism.
-APA Format.
.
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
According to Klein (2016), using ethical absolutism and ethical relativism in ethical decision making can lead to different outcomes. How can moral reasoning about a specific situation differ based on relativism or absolutism? Can you provide an illustration or example of an accounting procedure/situation whose outcome may differ based on absolutism or relativism? Is ethical relativism a more suitable standard within a global IFRS Environment? Why or why not?
at least 250 words
.
According to Franks and Smallwood (2013), information has become.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Provide a page response identifying and clearly stating what the difference are? APA Standard, 2 page response, not including front page and references.
.
According to the Council on Social Work Education, Competency 5.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation. Social workers:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to social services;
Assess how social welfare and economic policies impact the delivery of and access to social services;
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social, economic, and environmental justice.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare: Working with your field instructor, identify, evaluate, and discuss policies established by the local, state, and federal government (within the last five years) that affect the day to day operations of the field placement agency.
The Assignment (1-2 pages): (In The States California. The Good Seed is a Drop-In center for 18-25 years!
Describe the policies and their impact on the field agency.
Propose specific recommendations regarding how you, as a social work intern, and the agency can advocate for policies pertaining to advancing social justice for the agency and the clients it serves.
.
According to the authors, privacy and security go hand in hand; and .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.
Must be in APA format with references and citations.
.
According to the authors, countries that lag behind the rest of the .docxaryan532920
According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. Discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.
.
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
According to Peskin et al. (2013) in our course reader, "Studies on early health risk factors, including prenatal nicotine/alcohol exposure, birth complications, and minor physical anomalies have found that these risk factors significantly increase the likelihood of anti-social and criminal behavior throughout life." What policy changes might you suggest to help curtail the occurrence or effects of these risk factors? Remember to think about public health policy, not just criminal policy.
.
According to Franks and Smallwood (2013), information has become the.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q: Please identify and clearly state what the difference is?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to Ang (2011), how is Social Media management differen.docxaryan532920
According to Ang (2011), how is Social Media management different than traditional Customer Relationship Management (CRM)? Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management. Identify the benefits Social Media management. Provide examples to illustrate each point.
The paper must be 1-2 pages in length (excluding title and reference page) and in APA (6th edition) format. The paper must include the Ang (2011) article in correct APA format.
.
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
According to (Alsaidi & Kausar (2018), "It is expected that by 2020, around 25 billion objects will become the part of global IoT network, which will pose new challenges in securing IoT systems. It will become an easy target for hackers as these systems are often deployed in an uncontrolled and hostile environment. The main security challenges in IoT environment are authorization, privacy, authentication, admission control, system conformation, storage, and administration" (p. 213).
Discuss and describe the difference between a black hole attack and a wormhole attack.
.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
According to the text, crime has been part of the human condition since people began to live in groups. Ancient documents indicate that conduct we now call murder, theft, or robbery was identified as criminal by civilizations that existed thousands of years ago. Criminal laws regulate human conduct and tell people what they can and cannot do and, in some instances, what they must do under certain circumstances. In this assignment, you will explore different types of criminal conduct and the goals of criminal law.
Write a four to six (4-6) page paper in which you:
Determine whether or not the Ex Post Facto Clause can be used as a defense to prohibit the increase in federal minimum/mandatory sentencing guidelines after a federal defendant has committed the crime. Provide a rationale to support your position.
Explain the distinction between criminal, tort, and moral wrongs. Next, support or criticize the premise that the standards set by moral laws are higher than those set by criminal law.
Identify and discuss the differences between solicitation of another to commit a crime and a conspiracy to commit a crime. Next, support or criticize the use of the unilateral approach to conspiracy convictions.
Identify the four (4) goals of criminal law, and discuss the manner in which these four goals effectuate the purpose of protecting the public and preventing the conviction of innocent persons.
Use at least three (3) quality academic resources in this assignment.
Note:
Wikipedia and similar types of websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
This course requires use of new
Strayer Writing Standards (SWS
). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the nature and history of American criminal law.
Explain the role of individuals and federal, state, and local government agencies in crime fighting and prosecution of criminal offenses.
Analyze the essential legal elements of criminal conduct.
Use technology and information resources to research issues in criminal law.
Write clearly and concisely about criminal law using proper writing mechanics.
.
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
According to Ronald Story and Bruce Laurie, “The dozen years between 1968 and 1980 marked more than the beginning of Republican ascendency; they also saw the breakup of the New Deal coalition and the advent of conservative domination of American politics.” (CP 139).
In this essay, you should explain,
first
, how it is that conservatives came to dominate American politics by the 1980s and,
second
,
how the ideas and policies they embraced shaped American society into the twenty first century.
Rules:
1. 3-4 pages
2. Double spaced, 12-point font
3. Standard margins—Approximately 1.25 on left and right margins and 1 on top and bottom
4. In crafting your essay, you will want to construct a clear thesis and draw on evidence from the sources described below.
5.
Only
use these sources below.
Sources:
Context: The Close of the 1960s
1. The black cat tavern and the LGBT Movement
Link:
https://www.npr.org/2017/02/13/514935126/stonewall-riots-grab-the-spotlight-from-black-cat-protests
2. ESPN Sport center on Katherine Switzwer
Link:
https://www.youtube.com/watch?v=U6CoScOIK_I
3. Crisis in the Cities and 1968.pdf (attachment)
4. Excerpt from MLK’s final Speech in 1968
Link:
https://www.youtube.com/watch?v=Oehry1JC9Rk
5. Vietnam-The path to war.pdf (attachment)
The Rediscovery of the Market: Conservative Politics and Policies
6. Alfred Kahn’s Legacy: Cheap Flights
Link:
https://www.npr.org/2010/12/29/132422495/alfred-kahns-legacy-cheap-flights
7. A Second Gilded Age?.pdf (attachment)
.
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
According to Kirk (2016), most of your time will be spent work with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
.
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation.
Walden’s MSW program expects students in their specialization year to be able to:
Evaluate the implication of policies and policy change in the lives of clients/constituents.
Demonstrate critical thinking skills that can be used to inform policymakers and influence policies that impact clients/constituents and services.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare
: Working with your field instructor, identify a social problem that is common among the organization (or its clients) and research current policies at that state and federal levels that impact the social problem. Then, from a position of advocacy, identify methods to address the social problem (i.e., how you, as a social worker, and the agency advocate to change the problem). You are expected to specifically address how both you and the agency can effectively engage policy makers to make them aware of the social problem and the impact that the policies have on the agency and clients.
The Assignment (2-3 pages): Social Problems is Ex-cons finding Jobs Opportunities in State of California. The Agency is Called "Manifest" the website is Manifest.org
Identify the social problem
Explain rational for selecting social problem
Describe state and federal policies that impact the social problem
Identify specific methods to address the social problems
Explain how the agency and student can advocate to change the social problem
You are expected to present and discuss this assignment with your agency Field Instructor. Your field instructor will be evaluating your ability to demonstrate this competency in their field evaluation. In addition, you will submit this assignment for classroom credit. The Field Liaison will grade the assignment “PASS/FAIL,” see rubric for passing criteria.
.
According to Kirk (2016), most of our time will be spent working.docxaryan532920
According to Kirk (2016), most of our time will be spent working with our data. The four following group actions were mentioned by Kirk (2016):
Book: Kirk, A. (2016). Data visualisation a handbook for data driven design. Los Angeles, CA: Sage.
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
According to Davenport (2014) the organizational value of healthcare analytics, both determination and importance, provide a potential increase in annual revenue and ROI based on the value and use of analytics. To complete this assignment, research and evaluate the challenges faced in the implementation of healthcare analytics in the Health Care Organization (HCO) or health care industry using the following tools:
The paper must also address the following:
Application of PICO (problem, intervention, comparison group, and outcomes) to the challenge identified in your research.
The paper:
Must be two to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the
Ashford Writing Center. (Links to an external site.)
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly sources in addition to the course text.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
.
According to the authors, privacy and security go hand in hand; .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
Q: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
.
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and its input and possible output processes.
Briefly explain what the simulation modeling relies upon?
-500 words at least.
-No Plagiarism.
-APA Format.
.
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
According to Klein (2016), using ethical absolutism and ethical relativism in ethical decision making can lead to different outcomes. How can moral reasoning about a specific situation differ based on relativism or absolutism? Can you provide an illustration or example of an accounting procedure/situation whose outcome may differ based on absolutism or relativism? Is ethical relativism a more suitable standard within a global IFRS Environment? Why or why not?
at least 250 words
.
According to Franks and Smallwood (2013), information has become.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Provide a page response identifying and clearly stating what the difference are? APA Standard, 2 page response, not including front page and references.
.
According to the Council on Social Work Education, Competency 5.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation. Social workers:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to social services;
Assess how social welfare and economic policies impact the delivery of and access to social services;
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social, economic, and environmental justice.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare: Working with your field instructor, identify, evaluate, and discuss policies established by the local, state, and federal government (within the last five years) that affect the day to day operations of the field placement agency.
The Assignment (1-2 pages): (In The States California. The Good Seed is a Drop-In center for 18-25 years!
Describe the policies and their impact on the field agency.
Propose specific recommendations regarding how you, as a social work intern, and the agency can advocate for policies pertaining to advancing social justice for the agency and the clients it serves.
.
According to the authors, privacy and security go hand in hand; and .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.
Must be in APA format with references and citations.
.
According to the authors, countries that lag behind the rest of the .docxaryan532920
According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. Discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.
.
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
According to Peskin et al. (2013) in our course reader, "Studies on early health risk factors, including prenatal nicotine/alcohol exposure, birth complications, and minor physical anomalies have found that these risk factors significantly increase the likelihood of anti-social and criminal behavior throughout life." What policy changes might you suggest to help curtail the occurrence or effects of these risk factors? Remember to think about public health policy, not just criminal policy.
.
According to Franks and Smallwood (2013), information has become the.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q: Please identify and clearly state what the difference is?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to Ang (2011), how is Social Media management differen.docxaryan532920
According to Ang (2011), how is Social Media management different than traditional Customer Relationship Management (CRM)? Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management. Identify the benefits Social Media management. Provide examples to illustrate each point.
The paper must be 1-2 pages in length (excluding title and reference page) and in APA (6th edition) format. The paper must include the Ang (2011) article in correct APA format.
.
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
According to (Alsaidi & Kausar (2018), "It is expected that by 2020, around 25 billion objects will become the part of global IoT network, which will pose new challenges in securing IoT systems. It will become an easy target for hackers as these systems are often deployed in an uncontrolled and hostile environment. The main security challenges in IoT environment are authorization, privacy, authentication, admission control, system conformation, storage, and administration" (p. 213).
Discuss and describe the difference between a black hole attack and a wormhole attack.
.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Home assignment II on Spectroscopy 2024 Answers.pdf
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
1. INTRODUCTION & BACKGROUND
Certain events in US history seldom come along that have such
an impact that they fundamentally change the way society
functions. If the Japanese attack on Pearl Harbor could be
counted as one such event, it launching the US into WWII circa
1941-1945, then the attacks of 9/11 would also fit this criterion,
it ushering in the US-led, Global War on Terror. A difference
between the two, however, and subsequently a characterization
of the latter that makes it arguably even more impactful, is the
fact it has been going on for more than 13 years. And while
some would like the world to believe that the US has turned that
‘terrorist’ page in its history, highlighted by the successful
assassination of Osama Bin Laden, it is becoming all too clear
that the US, and the world, are smackdab in the middle of the
story, with no clear conclusion in sight. The truth has
unwelcomingly shone through with a clear consensus that “…Al
Qaeda [is] stronger than ever.” 1 Adding to the terrorism
problem is the emergence of another, more extreme group
known as the Islamic State of Iraq and al-Sham (ISIS). Despite
ISIS’s extra-ordinary level of cruelty, its ideology has still
managed to resonate with many around the world, evidenced by
its increasing membership; it having garnered an estimated
“20,000” new recruits from “90 different countries.” 2 Finally,
while on the topic of past and recent, history-shaping events, it
is the goal of the US and its Intelligence Community (IC) to
prevent such events from happening in the future. One possible
scenario that is becoming easier to visualize and closer to
actualization, is Iran’s attainment and subsequent use of nuclear
weapons. On the topic of a nuclear Iran, legal expert and
Harvard Law School Professor, Alan Dershowitz, has said,
“ISIS is nothing compared to [Iran]…[it] is a passing blip…If
[Iran] become[s] a nuclear weapons power, they will become the
most dangerous country in the world today.” 3 What, then, is to
be done? In the face of the growing and current threat of
2. terrorism, to the possible, future threat of a nuclear-armed Iran,
what can be done? Is there a strategy that the IC can implement
to eliminate and prevent these threats? The answers to these
questions can be found by looking to an intelligence gathering
discipline that is nearly as old as mankind itself, and one in
which history provides
1 Ali Soufan, “The Sad Legacy of 9/11: ISIS and Al Qaeda are
Stronger than Ever,” The Guardian, 2014, accessed March 1,
2015, http://www.theguardian.com/commentisfree/2014/sep/11/-
sp-9-11-isis-al-qaida-13-years
2 Joshua Berlinger, “The Names: Who has been recruited to
ISIS from the West,” CNN, 2015, accessed March 1, 2015,
http://www.cnn.com/2015/02/25/world/isis-western-recruits/
3 Courtney Coren, “Alan Dershowitz: ISIS is a ‘Passing Blip’
Compared to Iran,” News Max, 2015, accessed March 1, 2015,
http://www.newsmax.com/Newsmax-Tv/Alan-Dershowitz-Iran-
ISIS/2015/02/26/id/627101/
ample examples of its effectiveness; that intelligence discipline
being human intelligence (HUMINT). It is thus recommended,
that in order to gain the advantage and eventually win the war
on terror, as well as unveil the true intentions of Iran and its
nuclear program, that the US and its IC must make HUMINT
central to its intelligence gathering efforts.
From the Cold War to the Global War on Terror,
HUMINT has quietly proven its worth time and time again.
Even in the midst of the technological boom the world has been
experiencing these last 20 years, experts continue see the
unique value that only HUMINT can provide to the intelligence
picture. This is not to say that all intelligence resources should
completely shift to gathering and analyzing HUMINT, but
rather the focal point of intelligence gathering should be
focused on uncovering and unveiling the thoughts, goals,
aspirations, intentions and minds of US enemies, something
only HUMINT can produce. In the case of the terror groups Al
3. Qaeda and ISIS, HUMINT will yield details regarding future,
operational intent and targets in and outside of the US. In the
case of Iran, only Israel seems to be unanimous in its belief that
Iran wants to produce nuclear weapons, while in the case of
other members of the international community, it is still a
matter of debate. HUMINT against Iran will confirm or deny
these accusations made by Israel and others, as well as provide
US policy makers with the intelligence needed to take
preventative action; action to prevent production of nukes,
and/or action to prevent their usage.
HUMINT, OTHER ‘INTs’, & THE INTELLIGENCE PICTURE
Human Intelligence, or HUMINT, is the collection and analysis
of information from human sources. This includes, but is not
limited to, information gathered from espionage, witness
statements and interrogations. And while all intelligence
gathering disciplines have the capability, to some degree or
another, of revealing enemy intentions, it is HUMINT that is
most suitably equipped to reveal these things. Imagery
intelligence (IMINT), geospatial intelligence (GEOINT) and
measurement and signature intelligence (MASINT), on the other
hand, do not typically involve getting information directly from
a human source, i.e. the president of a country, the leader of a
terror group, etc. In the case of signals intelligence (SIGINT),
and especially its sub-category, communications intelligence
(COMINT) there can be a lingering degree of skepticism that
the information being retrieved is not accurate. Take, for
example, the scenario of a tapped phone conversation where one
or both parties may be fully aware that their conversation is
being recorded, so they start saying things to purposely mislead
intelligence personnel. In the same type of scenario, the tap may
be good; the individuals may be oblivious to it, but they may
also be oblivious to just about everything else. As one observer
put it, “Electronic intercepts are great, but you don’t know if
you’ve got two idiots talking on the phone…” 4 In times past,
most notably during the Cold War, these technologically-based
4. platforms were typically enough to get the job done “because
[the US] already knew the adversary’s intent…[but] in today’s
environment, these capabilities are no longer sufficient.” 5
Gathering intelligence is much like creating a painting where
the goal is to provide policy makers and other US officials with
as much detail, color and depth as possible. Where non-
HUMINT intelligence commonly provides an outline of the
painting by providing data and statistics, it is HUMINT that
provides the color, detail and the small nuances that can make
all the difference between a generic painting and a masterpiece.
In other words, HUMINT makes the painting move; it brings it
to life. In its purest form, HUMINT acts as a psychologist,
revealing the adversary’s heart and mind; revealing plans and
intentions that would otherwise go unnoticed. Such information
is crucial to winning a war against an enemy whose motives and
ideology are largely foreign to the masses. As Secretary of
State, John Kerry, recently stated, “You cannot defeat what you
don’t understand.” 6
HUMINT: PROVING ITS WORTH OVER TIME In spite of the
US’s justified reliance on IMINT and SIGINT during the Cold
War, the climax of the war, The Cuban Missile Crisis, and its
resolution was dependent upon information provided by an
insider; a HUMINT source. Many believe, and they are partially
correct in their belief, that it was simply a U-2
4 Matthew M. Aid & Cees Wiebes, “The Importance of Signals
Intelligence in the Cold War,” APUS, accessed February 27,
2015, https://edge.apus.edu/access/content/group/security-and-
global-studies-
common/INTL%20421/CONTENT/Week%202/Wiebes%20Intro
dcution%20The%20Importance%20of%20Signals
%20Intelligence%20in%20the%20Cold%20War.pdf
5 Luc Pigeon, Clark Beamish, and Michel Zybala, “HUMINT
communication information systems for complex warfare,”
Defense Technical Information Center (DTIC), 2002, accessed
5. February 27, 2015,
http://www.google.com/url?sa=t&rct=j&q=HUMINT+communic
ation+information+systems+for+complex+warfare
&source=web&cd=1&ved=0CCMQFjAA&url=http%3A%2F%2F
www.dtic.mil%2Fcgi-
bin%2FGetTRDoc%3FAD%3DADA467646&ei=usLwVJDVLcb
9yQTKi4KIBw&usg=AFQjCNFdMVLbHBBScA
tUjVWuF2AcjZiruw&bvm=bv.87269000,d.aWw&cad=rja
6 Patrick Goodenough, “Kerry: You Have to Understand
Terrorists to Defeat Them,” CNSNews, 2015, accessed February
27, 2015, http://www.cnsnews.com/news/article/patrick-
goodenough/kerry-you-have-understand- terrorists-defeat-them
reconnaissance plane that just so happened to be in the right
place at the right time when it captured photographic evidence
of Soviet nukes in Cuba. This is not the complete story,
however, as the U-2 was specifically directed on where to go
and what to look for thanks to the detailed information provided
by GRU Colonel, Oleg Penkovsky: “Penkovsky’s debriefing
sessions produced about 1,200 pages of transcripts,…[were]
immensely valuable,…[and] allowed [President] Kennedy to
pursue a diplomatic option…Penkovsky and HUMINT had
averted a disaster and saved the world from nuclear
destruction.” 7 Thanks to this HUMINT source, clearer heads
prevailed, and as a result, it was not the “last Saturday [Mr.
McNamara] would ever see,” 8 nor, thankfully, anyone else’s.
Another example of HUMINT’s worth is found
by looking at the events that led to the successful assassination
of Osama Bin Laden. The hunt for the most wanted man in the
world lasted over ten years. In spite the US’s technological
tools i.e. satellite imagery, UAV reconnaissance,
communications intercepts, electronic intercepts, etc., Bin
Laden was able to avoid capture by staying relatively low-tech,
and by using simple encryption devices to throw off US
intelligence services. The IC, realizing its difficulties in
6. tracking Bin Laden down, knew it had to shift its intelligence-
gathering focus. This shift eventually led to the capture and
interrogation of the supposed mastermind behind the 9/11
attacks, Khalid Sheikh Mohammed. With the aid of enhanced
interrogation techniques, Khalid eventually provided the CIA
with names of others who were involved, and also information
regarding Bin Laden’s personal courier. The information gained
from Khalid, along with the information gained from those he
named provided the IC with a target (the courier) to focus their
efforts on. The result, of course, was the US sending in Navy
Seals to finish the job, but initially, it was the information
received from these human sources that gave the manhunt a
guiding compass to follow.
STRAYING FROM HUMINT & THE NEED FOR ITS RETURN
Too often it seems that the IC tends to lose sight of the vital
role that HUMINT plays. This problem is likely caused by the
constant technological developments made in human society
which naturally bleed over to advancements in the
intelligence/military world. So much has technology
7 Rich Disabatino, “Interview: Rich Disabatino, PBS, 2001,
accessed December 27, 2014,
“http://www.pbs.org/wgbh/pages/frontline/shows/terrorism/inter
views/disabatino.html
8 “Cuban Missile Crisis,” History Channel, accessed August 29,
2014, http://www.history.com/topics/cold- war/cuban-missile-
crisis
imbedded itself into everyday life that it would be neigh
impossible for the average person to function without the
internet, social media, cell phones, GPS navigation and so on. It
is not just the IC, military or the average citizen who has
become heavily reliant on technology, but terror groups as well.
In fact, according to lecturer Clive Best, a group like Al Qaeda
7. could not even function today without the internet. 9
Due to this situation, it is the best interest of the IC to
constantly improve its technological capabilities, but at what
cost? Certainly not at the cost of sacrificing the quality and
quantity of HUMINT, for “some of the worst intelligence
failures…can be attributed to an absence of human
intelligence,” 10 including the attacks of 9/11. In an interview,
it was asked of Rich Disabatino, Director of Intelligence
Support Group, Ltd., to give his thoughts on the topic. He said:
“At one point in time, we thought that electronic intelligence
was going to replace human intelligence. I think we're seeing
right now that you can never replace human intelligence.
Electronic intelligence will only augment it.” 11 Others have
made similar statements as to the importance of HUMINT with
the following quote specifically geared towards the recently
emerged threat of ISIS: “the…art of collecting human source
intelligence has in large part become lost thanks
to…intelligence technology…This lack of HUMINT might have
something to do with the lack of warning about ISIS’s summer
blitz through Iraq and Syria.” 12 Lastly, from an official report
to the Speaker of the House of Representatives and the Minority
Leader, it was concluded that the “CIA did not sufficiently
penetrate the al-Qa’ida organization before September 11th .”
13 This issue needs to be addressed in the cases of Al Qaeda,
ISIS and Iran. The IC cannot afford to make the same type of
mistakes as it has in the past, especially in determining Iran’s
true nuclear intentions, for nuclear war is a possible price of
failure.
9 Clive Best, “Open Source Intelligence,” Video Lectures, 2007,
accessed February 23, 2015,
http://videolectures.net/mmdss07_best_osi/
10 Gabriel Margolis, “The Lack of HUMINT: A Recurring
Intelligence Problem,” Global Security Studies, 2013, accessed
February 27, 2015,
http://globalsecuritystudies.com/Margolis%20Intelligence%20%
8. 28ag%20edits%29.pdf
11 Rich Disabatino, “Interview: Rich Disabatino, PBS, 2001,
accessed December 27, 2014,
“http://www.pbs.org/wgbh/pages/frontline/shows/terrorism/inter
views/disabatino.html
12 Robert Caruso, “Here’s How the US Can Build the
Intelligence Capabilities Needed to Defeat ISIS,” Business
Insider, 2014, accessed February 27, 2015,
http://www.businessinsider.com/the-us-needs-better-humint-to-
beat-isis-2014-9
13 “Counterterrorism Intelligence Capabilities and Performance
Prior to 9-11,” Federation of American Scientists, 2002,
accessed February 27, 2015,
http://www.fas.org/irp/congress/2002_rpt/hpsci_ths0702.html,ac
cessed4Aug.2008.
ALL INTs WORKING TOGETHER – HUMINT AS THE
FOCAL POINT
It is clear that there is a special level of attention
that needs to be given to HUMINT in order to have a successful
strategy to face current and future threats. With that said,
however, it should also be made clear that all intelligence
gathering disciplines are needed to create a complete
intelligence picture. Looking back at the two examples above
that highlighted the track record of HUMINT’s worth, a closer
inspection of those events show that there is a little more to
their stories. In the case of the Cuban Missile Crisis, U-2
reconnaissance missions to capture photographs of soviet
missiles in Cuba were underway well before Oleg Penkovsky
dropped the ‘a-bomb of information,’ so to speak. Likewise,
after Penkovsky informed the CIA and Britain’s MI6 of the
nukes in Cuba, confirmation of Penkovsky’s claims were needed
since he was, after all, a Colonel in Russia’s GRU; not one that
exactly comes from a trustworthy background. This
confirmation was in fact provided by more U-2 reconnaissance
photos, or IMINT.
9. In the case of the hunt for Osama Bin Laden, the
information extracted from Khalid Sheikh Mohammed and the
other interrogated suspects were undoubtedly critical in finding
the target. Their information, however, was only a portion of
the ingredients that made for the overall success of the mission.
Once CIA personnel operating in Pakistan identified the courier
as Sheikh Abu Ahmed, much of the work was then passed to the
NSA and its COMINT team to “[intercept] telephone calls and
emails between [Ahmed’s] family and anyone inside Pakistan.”
14 The combined efforts of COMINT and HUMINT did not end
there as a monitored satellite phone call would prove to lead the
CIA to the doorstep of Bin Laden’s 3-story hideout. From there,
GEOINT and IMINT played their respective roles as advanced
satellite imagery took “high-res and infrared images of the
compound” in order to map its layout. With the blueprints in
hand, the CIA had a replica of the compound built in North
Carolina and which would be used as a training ground for the
Navy Seals. So accurate was the GEOINT and IMINT-produced
layout, that the Seals were told what floor of the structure they
would likely find Bin Laden on. 15
14 “Timeline: The Intelligence Hunt Leading to Bin Laden,”
BBC, 2011, accessed February 27, 2015,
http://www.bbc.com/news/world-south-asia-13279283
15 Emily Smith, “How did the CIA Find Bin Laded?...” The
Blaze, 2011, accessed February 27, 2015,
http://www.theblaze.com/stories/2011/05/02/how-did-the-cia-
find-bin-laden-a-phone-call-a-courier-and-years-of- detective-
work/
Thus in both examples it is seen that relying
wholly on one intelligence gathering discipline would largely be
unproductive, but when a combination is used, it is a completely
different story with the results often changing the course of a
conflict or war. What is also evident is HUMINT’s key role,
having played the ‘initiator’ in both scenarios in the sense that
10. HUMINT got the ball rolling; it provided direction and clarity
where before there was little or none whatsoever. It is for these
reasons why it has been said that “…correlating HUMINT data
with that of signals intelligence (SIGINT), geospatial
intelligence (GEOINT) and measurement and signatures
intelligence (MASINT)…is a key criterion for generating the
right knowledge.” 16
HUMINT NEEDED AGAINST AL QAEDA AND ISIS
“To win this war on terrorism and to find
people, HUMINT is first among equals.” 17 Why, then, has
there been such a reluctance to employ espionage tactics against
the threat of terrorism? As it turns out, there are, indeed, valid
reasons; one being that espionage is extremely risky, where the
result of being caught usually means death. Between the US and
its allies during the Cold War, for example, thousands of agents
were lost to the Soviets and N. Korea. 18 While it is safe to
assume that Soviet Russia was not kind to American spies, it is
not hard to imagine an outcome that is even more brutal if Al
Qaeda or ISIS captured a US spy hiding within its ranks.
What adds to this danger is the fact that there
is the matter of a complete social, cultural, religious, linguistic
and racial disparity between people from the Middle East,
including Muslim extremists, and people from the US, including
HUMINT intelligence operators. This is not to say that it is
impossible for a CIA operator to penetrate a terrorist cell, but
that it would be extremely difficult, and may not be worth the
risk if there are other viable options.
16 Robert Ackerman, “Defense HUMINT Needs Technology,
Too,” AFCEA, 2006, accessed February 27, 2015,
http://www.afcea.org/content/?q=node/1202
17 Ibid
18 Matthew M. Aid & Cees Wiebes, “The Importance of Signals
Intelligence in the Cold War,” APUS, accessed February 24,
2015, https://edge.apus.edu/access/content/group/security-and-
11. global-studies-
common/INTL%20421/CONTENT/Week%202/Wiebes%20Intro
dcution%20The%20Importance%20of%20Signals
%20Intelligence%20in%20the%20Cold%20War.pdf
One of these ‘other’ options, is working
directly with allied nations, for “inter-operability with…allied
HUMINT organizations is fundamental to effective HUMINT
operations.” 19 Furthermore, it would be in the best interest of
the US to work with allied nations located in the Middle East;
with a people and in a place where this extreme disparity does
not exist.
Nations such as Jordan and Lebanon each
have their own intelligence agencies, agencies that are manned
by natives of the country and region. These individuals know
the religion, culture, history and all other social aspects that the
terrorists are familiar with, having grown up there as well.
Professor Walid Phares, who was born in Lebanon, expounds on
this idea, and also why he feels he is personally able to
understand the mindset of these terrorists:
It was not difficult for me to read the mind of the
leader of al Qaeda. I had read the same history books he read.
We have looked at the same pictures, heard the same legends
over and over. I listened to the same type of Friday preaching
(khutba), read the same Qu’ran and Hadith, and devoured the
same Salafi accounts that he did; so did millions of others
around the Middle East. 20
This coordination with friendly nations, along
with the familiarity these nations have with Al Qaeda and ISIS
members are the keys to penetrating terrorist cells. The result
will be the attainment of vital HUMINT regarding the intentions
and plans of Al Qaeda and ISIS leaders. In the case of Jordan,
there is much at stake as it “is the next major target for [the
Islamic State], and [Jordanian] King Abdullah knows it.” 21 On
a positive note, “[Jordan’s] intel is very good on some
12. things…and they work…Humint hard. They likely have al
Qaeda penetrated at some level.” 22 The US
19 Luc Pigeon, Clark Beamish, and Michel Zybala, “HUMINT
communication information systems for complex warfare,”
Defense Technical Information Center (DTIC), 2002, accessed
February 27, 2015,
http://www.google.com/url?sa=t&rct=j&q=HUMINT+communic
ation+information+systems+for+complex+warfare
&source=web&cd=1&ved=0CCMQFjAA&url=http%3A%2F%2F
www.dtic.mil%2Fcgi-
bin%2FGetTRDoc%3FAD%3DADA467646&ei=usLwVJDVLcb
9yQTKi4KIBw&usg=AFQjCNFdMVLbHBBScA
tUjVWuF2AcjZiruw&bvm=bv.87269000,d.aWw&cad=rja
20 Walid Phares, “Future Jihad: Terrorist Strategies Against
America,” APUS, 2005, accessed February 28, 2015,
http://site.ebrary.com/lib/apus/reader.action?docID=10135448
21 Rowan Scarborough, “NSA intercepts key to locating…”
Washington Times, 2014, accessed February 28, 2015,
http://www.washingtontimes.com/news/2014/sep/23/nsa-scores-
victory-in-foiling-khorasan-groups-us- t/?page=all
22 Ibid
needs to reach out to Jordan, a long standing US-ally, and begin
a bilateral, HUMINT intelligence effort to gain the intelligence
Jordan has and continues to obtain. Once the US becomes privy
to the existing Jordanian intelligence on the terrorist groups, the
US can begin augmenting Jordan’s HUMINT effort with funds,
equipment, and the backing of the CIA and NSA which includes
GEOINT, MASINT, IMINT, and SIGINT capabilities.
Another opportunity for HUMINT arises from
the relationship between Lebanon and the Shi’ite, terrorist
community, Hezbollah. Hezbollah primarily resides in Lebanon
and even holds seats in Lebanon’s Parliament. 23 Currently, the
US has a good standing relationship with Lebanon as it acts as a
13. huge financial support of Lebanon’s. On the other hand,
however, the US has officially categorized Hezbollah as a
terrorist organization. Hezbollah’s feelings towards the US are
largely mutual as Hezbollah leader, Hassan Nasrallah, recently
suggested that the CIA is a direct supporter of ISIS. 24 The
glimmer of hope for coordination arises from other comments
made by Nasrallah, namely that he has “call[ed] on the people
and governments of the region in order to work together to
confront the [infidel/ISIS] threat.” 25 Adding to this hope is the
fact that ISIS has recently declared war on Lebanon,
Hezbollah’s resident state. Taking all these factors into
consideration, Hezbollah may see the benefits of working with
the US, especially if Lebanon used some of its political leverage
to persuade Hezbollah to move towards the US’s direction.
There are a few primary reasons as to why
such a complex and comprehensive effort should be made to
create an alliance with Hezbollah, even if it is a temporary one.
For one, Hezbollah is “probably the world’s largest, most
sophisticated, wealthiest and most militarily capable terror
organization” in the world. 26 Along these lines, it also has
formidable HUMINT capabilities, so much so, that as recently
as 2006, it successfully infiltrated the state of Israel,
“manag[ing] to recruit valuable information” which led to
23 Jonathan Masters and Zachary Laub, “Hezbollah,” Council
on Foreign Relations, 2014, accessed March 1, 2015,
http://www.cfr.org/lebanon/hezbollah-k-hizbollah-
hizbullah/p9155
24 Edwin Mora, “Hezbollah Chief…,” Breitbart, 2015, accessed
February 28, 2015, http://www.breitbart.com/national-
security/2015/02/17/hezbollah-chief-urges-middle-east-unity-in-
anti-isis-fight- accuses-cia-and-israels-mossad-of-backing-isis/
25 Ibid
26 Shai Oseran, and Stephane Cohen, “Don’t be fooled.
Hezbollah is bigger and badder than ever,” The Tower, 2014,
14. accessed March 1, 2015, http://www.thetower.org/article/dont-
be-fooled-hezbollah-is-bigger-and- badder-than-ever/
successful attacks against Israeli Defense Forces (IDF). 27
Potentially having HUMINT assets inside Al Qaeda and ISIS
that already have extremist Islamic/terrorist roots could be
extremely beneficial, and likely lead to bigger intelligence
opportunities. Their familiarity with terrorist operations could,
in the long run, lead to promotions, quickly moving up the
ranks, and even leading missions. This would undoubtedly lead
to them attending meetings with Al Qaeda/ISIS leaders and, in
turn, being privy to information regarding major operations. As
much of a long shot as an alliance with Hezbollah may be, a
genuine effort needs to be made, for the potential information
that could be obtained would possibly have as great of effect as
Penkovsky’s submissions to the CIA had in his day.
Another suggestion on how to gather HUMINT
on these Middle Eastern terrorists would be to look south –
south to the notoriously insecure US-Mexico border, and the
Central/South American nations that fall below it. It is well
known that Al Qaeda and ISIS have turned to the drug trade as a
method to fund their operations, and because of the countries
they are in, business with natives naturally and commonly
occur. Drug deals around the US-Mexico border is where the
focus should be, as there is a higher potential for the buyers to
be American. Herein lies opportunities: looking to Bosnia as an
example, it was shown that “[Bosnian] intelligence services
entities…involve[ed] themselves in crime as a profitable
sideline.” 28 It is probably unrealistic expect the CIA to get
involved in organized crime, especially as a ‘profitable
sideline,’ but it would not be unrealistic for it to place an
insider in a criminal organization, or insiders in multiple
organizations that do business with Al Qaeda and/or ISIS drug
cartels. These HUMINT assets will likely have the opportunity
to place tracers and/or listening devices on the terrorists or their
15. vehicles. These devices will lead the CIA to their bases of
operations where communications regarding future operations
between them and their leadership in the Middle East will likely
happen. SIGINT/COMINT equipment can be used to trace phone
calls and intercept email traffic, all the while revealing names,
dates, locations and other pertinent information. Though in the
end this
27 David Eshel, “Hezbollah’s Intelligence War,” Defense
Update, 2007, accessed March 1, 2015, http://defense-
update.com/analysis/lebanon_war_1.htm
28 Luc Pigeon, Clark Beamish, and Michel Zybala, “HUMINT
communication information systems for complex warfare,”
Defense Technical Information Center (DTIC), 2002, accessed
February 27, 2015,
http://www.google.com/url?sa=t&rct=j&q=HUMINT+communic
ation+information+systems+for+complex+warfare
&source=web&cd=1&ved=0CCMQFjAA&url=http%3A%2F%2F
www.dtic.mil%2Fcgi-
bin%2FGetTRDoc%3FAD%3DADA467646&ei=usLwVJDVLcb
9yQTKi4KIBw&usg=AFQjCNFdMVLbHBBScA
tUjVWuF2AcjZiruw&bvm=bv.87269000,d.aWw&cad=rja
would end up primarily as a SIGINT operation, the original key
to success would be due to HUMINT efforts.
The final suggestion for HUMINT operations
against Al Qaeda and ISIS would also be based in the Central
and South American regions. Not only do these terror groups
have their own drug cartels, but they also attempt to recruit
like-minded and impressionable individuals in these areas.
Often enough, however, some of these recruits do not share the
same level of enthusiasm or commitment. In other words, one
could ‘count them out’ for going on ‘one-way-ticket’ missions.
It is these individuals that the US can target for recruitment, for
many of them may be involved just for the money they make
from assisting in drug deals. As such, the US can financially
16. reward and bribe these individuals for information: locations of
terrorist camps, bases of operation, names, email addresses,
phone numbers, etc. These contacts can be made through similar
means as described above i.e. tracers, listening devices, bugs.
The information gained from these HUMINT
contacts, as well as from the communications between terrorist
drug dealers and their leadership in the Middle East will garner
invaluable intelligence. Such intelligence should be of
particular value considering the many security issues that
plague the US- Mexico border. In other words, the US-Mexico
border is as good a place as any for a terrorist attack to occur,
and therefore one that should be guarded with the utmost effort.
HUMINT NEEDED AGAINST IRAN
For decades, Iran has had its heart set on
establishing a fully operational nuclear program. It has
repeatedly stated that its desire for having such is strictly for
peaceful, economic purposes. It is the justified suspicion of
many, however, that a nuclear-powered Iran would by
synonymous as a nuclear- armed Iran. Iran does not help its
case, either, as its leaders have frequently made threats against
US ally, Israel. It is because of these threats, at least in part,
that the Prime Minister of Israel, Benjamin Netanyahu, has been
the most vocal opponent of a nuclear Iran. In fact, he has
recently said that “a nuclear threshold [Iran]…is a threat to the
entire world…and it is much worse than the threat of Islamic
State.” 29 Another matter that fuels suspicions regarding Iran’s
true intentions is the fact that it has illegally built nuclear
reactors in the past. At least one of these facilities was believed
to be a nuclear reactor specifically designed to construct nuclear
weapons, so much so that Israel sent in jet fighters, destroying
the facility in 2007. 30
If the threats against Israel and the illegal
building of nuclear facilities was not enough, Iran also has
17. significant ties to the terror groups Hezbollah and Hamas. One
particular point of concern here is that it is common knowledge
that state actors, such as Iran, use non-state actors, like
Hezbollah and Hamas, to push their political and militaristic
agendas against their enemies. In this case, it is quite possible
that Iran may be reluctant to deploy a nuclear weapon against
Israel in fear of a nuclear- retaliation from Israel, or even the
US. This being the case, Iran could manufacture a nuclear
device and secretly hand it over to Hamas or Hezbollah, and
allowing one of them to use it on Israel.
Despite all of these indicators – indicators that
point to Iran’s nuclear intentions being hostile in nature – many
in and out of the US do not see any real danger in granting
Iran’s wish for a fully operational nuclear program. Thus,
official negotiations have begun and progressed, as of late, in
which the US, Iran and other nations around the world have
come together to see if an agreement can be made to allow Iran
to proceed with its desired nuclear program. The conflict is
clear, and so, too, is the path to resolve it. Unveiling and
verifying Iran’s true nuclear intentions is the only way to truly
settle this issue, and it must be settled; the stakes are too high
to let this situation ‘play out’ without intervention. And though
intelligence on and against Iran has improved lately, “there are
still…critical gaps in what [the US] know[s] about what is
going on inside the country, especially in the realm of the CIA’s
HUMINT operations in Iran.” 31
When a nation knows it is the primary target
of a sworn enemy, it is going to fight back more vigorously than
any secondary target. Seeing the example of this in Jordan’s
response to ISIS, namely
29 Herb Keinon, “Netanyahu warns world powers: A nuclear
threshold Iran is a bigger threat than ISIS,” Jerusalem Post,
2014, accessed March 1, 2015, http://www.jpost.com/Israel-
News/Netanyahu-warns-world-powers- A-nuclear-threshold-
18. Iran-is-a-bigger-threat-than-ISIS-379211
30 Noah Klieger, “A Strike in the Desert,” YNet News, 2012,
accessed March 1, 2015,
http://www.ynetnews.com/articles/0,7340,L-3799227,00.html
31 Matthew Aid, “Spying on Iran,” MatthewAid.com, 2012,
accessed March 1, 2015,
http://www.matthewaid.com/post/20716455365/spying-on-iran
its aggressive HUMINT campaign against the terrorists, the US
can fully anticipate Israel having the same level of fervor in its
espionage campaign against Iran. The information and
intelligence gained by Israel’s Mossad agents needs to be shared
with US officials to fill-in these ‘critical gaps.’ In return, the
US IC needs to fully support Israeli-HUMINT operations
against Iran as if the operations were their own. This includes
any cyber-espionage support, such as a Flame-style virus which
has been useful against Iran’s nuclear facilities in the past, 32
nuclear-MASINT support to read and monitor any significant
changes or abnormalities emanating from existing Iranian
nuclear facilities, and any other technologically-based
intelligence platform that can augment, support and help verify
the intelligence garnered from Israeli, HUMINT sources. The
information the Mossad will uncover, and subsequently shared
with the US, will likely play a key role in the determining the
outcome of current nuclear negotiations had between the US and
Iran. In other words, if Israeli intelligence uncovers that Iran is,
indeed, attempting to make a nuclear bomb, then negotiations
would be terminated, drastically reducing the fear of a nuclear
equipped Iran and a possible nuclear war.
Another way HUMINT can be collected on Iran
is by looking to the International Atomic Energy Agency
(IAEA). The IAEA is an agency that acts as the world’s nuclear
police, in a sense, in that it monitors nuclear usage, verifies that
nuclear power is being used for peaceful purposes, and develops
standards that all nations using nuclear power must abide by.
19. The IAEA is intimately involved in the Iranian situation, often
having personnel in Iran to inspect its nuclear facilities. Having
a CIA officer, who is studied in uranium enrichment and nuclear
weapons production, covertly be a part of the IAEA team tasked
to inspect Iran would essentially put the US inside Iran’s
nuclear facilities that are commonly in question. This would
give intelligence analysts the type of firsthand data and
information that viruses and monitoring devices simply cannot
supply, and hopefully help form some indication as to the true
intentions surrounding Iran’s nuclear ambitions. If there are
strong suspicions and indicators that Iran may be producing
nuclear weapons, additional HUMINT may be necessary for
verification. This can be done by the CIA’s, IAEA insider by
providing names, addresses and places frequently visited by the
lead scientists working in these facilities.
32 “Flame Virus Explained: how it works and who’s behind it,”
Russia Today, 2012, accessed March 1, 2015,
http://rt.com/news/flame-virus-cyber-war-536/
These bits of information will be used in the
overarching effort to set up a time and place where one of these
Iranian scientists can be securely kidnapped and interrogated
for information regarding possible nuclear weapons production.
A near identical operation was conducted by
the CIA in 2009 when “Shahram Amiri, [an] Iranian nuclear
scientist…was kidnapped by secret agents” in Saudi Arabia. 33
Keeping in step with the 2009 kidnapping, CIA operatives will
look for every effort to initiate this kidnapping outside of Iran
and in a friendly nation to reduce any unnecessary risk. Also,
the CIA team involved must utilize extreme caution in
protecting their identities and national origins. This is so
because the Iranian scientist, upon his eventual return to Iran,
will undoubtedly be debriefed. As such, the CIA will only want
its name mentioned as ‘suspected’ kidnappers, nothing more.
Additionally, this will give the US plausible deniability when
20. Iran starts to point fingers, allowing future negotiations to still
take place. In other words, the last thing the US wants is for
Iran to know the CIA was directly involved, giving Iran an
excuse to retreat into the shadows, and thereby cutting off all
communicative efforts with the US, leaving the US with even
more ‘critical gaps’ than before.
CONCLUSION
The threats and attacks faced today from ISIS and Al
Qaeda are growing in number, in frequency and in their level of
barbarity. Additionally, if what is said by Prime Minister
Netanyahu and Professor Alan Dershowitz is true, namely that
the threats posed by ISIS and Al Qaeda pale in comparison to
the threat of a nuclear Iran, then there is no time to delay.
Increased HUMINT operations against these threats need to
commence and not cease until the world is secure.
Foundationally speaking, these present and future
threats are not new, for similar enemies were faced during
WWII with Nazi Germany, and through the Cold War where the
world looked down the barrel of nuclear war with Soviet Russia.
And similar to the case of the Cuban Missile Crisis, which was
defused by the words of a Soviet Colonel, so too can the threat
of terrorism and threat of Iranian nukes be defused by human
intelligence. Time and time again, HUMINT has stood the test
of time as a unique and
33 Richard Spencer, “Iranian Nuclear Scientist Recounts CIA
Abduction,” The Telegraph, 2010, accessed March 1, 2015,
http://www.telegraph.co.uk/news/worldnews/middleeast/iran/78
90697/Iranian-nuclear-scientist- recounts-CIA-abduction.html
undeniably effective intelligence gathering platform. It is able
to penetrate the minds and thoughts of its targets, revealing the
true intentions and operational plans against the US’s greatest
enemies. For these reasons, HUMINT needs to be the central,
21. intelligence gathering figure in the fight against today and
tomorrow’s threats.
REFERENCES
Ackerman, Robert. “Defense HUMINT Needs Technology,
Too.” AFCEA. 2006. accessed February 23, 2015.
http://www.afcea.org/content/?q=node/1202
Disabatino, Rich. “Interview: Rich Disabatino. PBS. 2001.
accessed February 25, 2015.
http://www.pbs.org/wgbh/pages/frontline/shows/terrorism/interv
iews/disabatino.html
Aid, Matthew M., & Wiebes, Cees. “The Importance of Signals
Intelligence in the Cold War.” APUS. accessed February 24,
2015. https://edge.apus.edu/access/content/group/security-and-
global- studies-
common/INTL%20421/CONTENT/Week%202/Wiebes%20Intro
dcution%20The%20Importance%
20of%20Signals%20Intelligence%20in%20the%20Cold%20War.
pdf
Soufan, Ali. “The Sad Legacy of 9/11: ISIS and Al Qaeda are
Stronger than Ever.” The Guardian. 2014. accessed March 1,
2015. http://www.theguardian.com/commentisfree/2014/sep/11/-
sp-9-11-isis- al-qaida-13-years
Berlinger, Joshua. “The Names: Who has been recruited to ISIS
from the West.” CNN. 2015. accessed March 1, 2015.
http://www.cnn.com/2015/02/25/world/isis-western-recruits/
Coren, Courtney. “Alan Dershowitz: ISIS is a ‘Passing Blip’
Compared to Iran.” News Max. 2015. accessed March 1, 2015.
http://www.newsmax.com/Newsmax-Tv/Alan-Dershowitz-Iran-
ISIS/2015/02/26/id/627101/
22. Pigeon, Luc, Beamish, Clark and Zybala, Michel. “HUMINT
communication information systems for complex warfare.”
Defense Technical Information Center (DTIC). 2002. accessed
February 27, 2015.
http://www.google.com/url?sa=t&rct=j&q=HUMINT+communic
ation+information+systems+for+co
mplex+warfare&source=web&cd=1&ved=0CCMQFjAA&url=htt
p%3A%2F%2Fwww.dtic.mil%2Fcg i-
bin%2FGetTRDoc%3FAD%3DADA467646&ei=usLwVJDVLcb
9yQTKi4KIBw&usg=AFQjCNFdMV
LbHBBScAtUjVWuF2AcjZiruw&bvm=bv.87269000,d.aWw&ca
d=rja
Goodenough, Patrick. “Kerry: You Have to Understand
Terrorists to Defeat Them.” CNSNews. 2015. accessed February
27, 2015. http://www.cnsnews.com/news/article/patrick-
goodenough/kerry- you-have-understand-terrorists-defeat-them
“Cuban Missile Crisis.” History Channel. accessed August 29,
2014. http://www.history.com/topics/cold- war/cuban-missile-
crisis
Best, Clive. “Open Source Intelligence.” Video Lectures. 2007.
accessed February 23, 2015.
http://videolectures.net/mmdss07_best_osi/
Margolis, Gabriel. “The Lack of HUMINT: A Recurring
Intelligence Problem.” Global Security Studies. 2013. accessed
February 27, 2015.
http://globalsecuritystudies.com/Margolis%20Intelligence%20%
28ag%20edits%29.pdf
Caruso, Robert. “Here’s How the US Can Build the Intelligence
Capabilities Needed to Defeat ISIS.” Business Insider. 2014.
accessed February 27, 2015.
http://www.businessinsider.com/the-us- needs-better-humint-to-
23. beat-isis-2014-9
“Counterterrorism Intelligence Capabilities and Performance
Prior to 9-11.” Federation of American Scientists. 2002.
accessed February 27, 2015.
http://www.fas.org/irp/congress/2002_rpt/hpsci_ths0702.html,ac
cessed4Aug.2008.
“Timeline: The Intelligence Hunt Leading to Bin Laden.” BBC.
2011. accessed February 27, 2015.
http://www.bbc.com/news/world-south-asia-13279283
Smith, Emily. “How did the CIA Find Bin Laded?...” The Blaze.
2011. accessed February 27, 2015.
http://www.theblaze.com/stories/2011/05/02/how-did-the-cia-
find-bin-laden-a-phone-call-a- courier-and-years-of-detective-
work/
Phares, Walid. “Future Jihad: Terrorist Strategies Against
America.” APUS. 2005. accessed February 28, 2015.
http://site.ebrary.com/lib/apus/reader.action?docID=10135448
Scarborough, Rowan. “NSA intercepts key to locating…”
Washington Times. 2014. accessed February 28, 2015.
http://www.washingtontimes.com/news/2014/sep/23/nsa-scores-
victory-in-foiling- khorasan-groups-us-t/?page=all
Masters, Jonathan and Laub, Zachary. “Hezbollah,” Council on
Foreign Relations. 2014, accessed March 1, 2015.
http://www.cfr.org/lebanon/hezbollah-k-hizbollah-
hizbullah/p9155
Mora, Edwin. “Hezbollah Chief…” Breitbart. 2015. accessed
February 28, 2015. http://www.breitbart.com/national-
security/2015/02/17/hezbollah-chief-urges-middle-east-unity-in-
anti-isis-fight-accuses-cia-and-israels-mossad-of-backing-isis/
24. Oseran, Shai and Cohen, Stephane. “Don’t be fooled. Hezbollah
is bigger and badder than ever.” The Tower. 2014. accessed
March 1, 2015. http://www.thetower.org/article/dont-be-fooled-
hezbollah-is-bigger-and-badder-than-ever/
Eshel, David. “Hezbollah’s Intelligence War.” Defense Update.
2007. accessed March 1, 2015. http://defense-
update.com/analysis/lebanon_war_1.htm
Keinon, Herb. “Netanyahu warns world powers: A nuclear
threshold Iran is a bigger threat than ISIS.” Jerusalem Post.
2014. accessed March 1, 2015. http://www.jpost.com/Israel-
News/Netanyahu- warns-world-powers-A-nuclear-threshold-
Iran-is-a-bigger-threat-than-ISIS-379211
Klieger, Noah. “A Strike in the Desert.” YNet News, 2012.
accessed March 1, 2015.
http://www.ynetnews.com/articles/0,7340,L-3799227,00.html
Aid, Matthew. “Spying on Iran.” MatthewAid.com. 2012.
accessed March 1, 2015.
http://www.matthewaid.com/post/20716455365/spying-on-iran
“Flame Virus Explained: how it works and who’s behind it.”
Russia Today. 2012. accessed March 1, 2015.
http://rt.com/news/flame-virus-cyber-war-536/
Spencer, Richard. “Iranian Nuclear Scientist Recounts CIA
Abduction.” The Telegraph. 2010. accessed March 1, 2015.
http://www.telegraph.co.uk/news/worldnews/middleeast/iran/78
90697/Iranian-nuclear- scientist-recounts-CIA-abduction.html
Financial Decisions
In both your professional and personal life, you will make a
variety of decisions. You should consider the financial and
25. nonfinancial aspects while making decisions. To evaluate
scenarios, you will also use some tools such as net present value
(NPV), internal rate of return (IRR), modified internal rate of
return (MIRR), payback, discounted payback, and return on
investment (ROI) that you have discussed so far.
In this assignment, you will evaluate the financial aspects of
making decisions.
Tasks:
Investigate any two of the following four financial decisions:
1) Using net present value calculations, determine which has a
higher ROI. Assume the average mileage under both options is
15,000 miles. The car will be sold for its Kelly Blue Book value
at the end of ownership or it will be returned to the leasing
dealership for no additional lease/return/mileage cost. The
automobile being considered is a 4-cyl, 2.5 liter, two-wheel
drive, Nissan Rogue sport utility. At the end of the 6 years, the
automobile is in very good condition. Tax, title, or license fees
are not considered under either option.
· Buying a Nissan Rogue today for $32,000, putting $10,000
down and taking a six-year loan for the rest at 4%
or
· Leasing the Rogue for 6 years at $360 a month with a down
payment of $3,500 due at delivery. The car must be returned at
the end of the lease. 15,000 miles per year are allowed under
this lease plan.
Show your work and explain your rationale.
2) Commit to buy a vacation home in the climate of your
choice, rent the home out when you are not using it, or sign a
five-year lease for the home for the two months a year you plan
on using it. You will need to make up the numbers for your
home for this exercise.
3) A different buy-or-lease alternative—you could buy a home
for $300,000, putting 20% down and renting it out at $1,700 a
month. Which would make more financial sense? Buying or
26. leasing the home? Explain your rationale.
4)Lease your home for the next three years or sell it with the
intent to return to the same geographic area after you complete
a three-year expatriate assignment in the country of your
choice. Given the facts above, should you lease the house or sell
it? The current market value is approximately $320,000. Explain
your rationale, and show your work.
For the two options that you selected (and using the figures
given above for those options), investigate the realistic
assumptions for your location and include the information you
found in the analysis. Create a paper in about 1,000–1,200
words, including the following:
· Initial information/approach: purchase price, rebate, down
payment, amount to finance, etc.
· Payments formulas and calculations
· Explanation of the financial factors that you are employing in
the selected decisions
· Conclusion containing the "best answer" for your personal life
on the basis of these financial factors
· Probability of following the recommended "best answer"
(assuming that these are the only decision options)
Grading Criteria
Maximum Points
Communicates understanding of financial factors employed in
the selected decisions.
Communicates the ability to analyze the situation and provide
optimal conclusions on the basis of financial factors.
Communicates the ability to assess the probability of following
the recommended solutions
Conveys through written word understanding and application of
the essential assignment components