SlideShare a Scribd company logo
1 of 9
LEE JACOB GARCIA
Hello Classmates,
1. Describe the framework for managing and leading a security
force.
The framework for managing and leading a security force starts
with the port managers and leaders. The key to establishing this
framework within the port security organization is in how well
the leadership develops the middle management function
(Christopher, 2014). The best tool that may be utilized is the
use of "middle-managers", middle-managers can be the "go to"
individual where in fact, they become the liaison between the
front line workers and upper management. When developing
middle managers, senior leaderships must ensure they
understand and have the full expectations of the Organization’s
intent, mission, and goals, in order for middle managers filter
this down to the operational levels, where the actual work of
port security gets done. In the military, these positions are what
we call Team Leaders, senior leaders mentor and develop Team
Leaders in order for the team to achieve success with their
everyday mission or goals. Team Leaders must understand the
Organization’s intent, mission, goals, regulations, policies, and
procedures in order to better guide their Soldiers. Team Leaders
are the keen advocate for the Soldiers because they interact
more with the Soldiers and guide them to ensure standards are
being met. They achieve this through active engagement and
constant evaluations of their work performance and their
professional/personal development.
One of the main role of middle-manager is to ensure that issues
from subordinates are brought up the chain of command and
these middle-managers can solicit input from employees and act
accordingly to ensure policy reflects the wishes of the
employees. Employee input is crucial to make this type of work
model productive. Leadership skills are then exercised and
exploited by acting accordingly on these issues in their level, if
issues are of higher concerns, this is when middle managers
raises these issues to senior leaderships to get some answers.
2. What is meant by maintaining force competencies in port
security?
Maintaining force competencies is for port security
management to assess the level of competency of the security
workforce. It is important that the port security management
team maintain force competencies and asses if the workforce
has adequate training required in order for them to do their job.
Understanding the type of training required is crucial for port
security management to know hence, security management
would know what qualifications and training is needed.
Each training requirement and certifications may vary
depending on the capacity of their job and expected to perform.
The importance is to asses if the workforce are qualified to
perform their duties as expected. Validation and assessment of
training and certifications must be done frequently depending
on what is established or outlined based on the Standard
Operating Procedures (SOP). SOP entails detailed or specific
guidance relating to each specific duties, objectives, or policies.
Jake
Reference
Christopher, K. (2014). Port Security Management, Second
Edition. Bosa Roca: CRC Press. Retrieved from
http://ebookcentral.proquest.com.ezproxy2.apus.edu/lib/apus/de
tail. action?docID=1578619
Todd Stevenson
1. Describe the framework for managing and leading a
security force.
To better understand the question let's first look at the
definition of framework. According to the Merriam-Webster
dictionary, framework is defined as “(a): a basic conceptional
structure (as of ideas), and (b): a skeletal, openwork, or
structural frame” (Merriam-Webster, n.d.). With that said, to me
framework is the basic structure that holds everything together.
This is true whether we’re talking about computer software, a
treehouse, your home, or even a game you’re playing.
Framework is the very building blocks our everyday lives are
built around. Just as our lesson has pointed out, the framework
for managing or leading a security force to protect our ports
starts with port managers and leaders. One of the more
important framework tasks for managers and leaders of a port
security force is ensuring all participants are on the same page
and acting as a single organism. Per this week’s lesson, middle-
management plays a key role in the framework of a port security
team’s ability to communicate with upper management. It is
through middle-management a port security team can get a clear
understanding of the strategic plan, mission, values, and
required tasks. A strong foundation or framework is crucial to
building a cohesive security force that’s on the same page, and
an understanding of the management team’s strategic plan, and
mission statement. It is a strong framework that allows a
security force the ability to execute a port’s emergency
strategies on a moment’s notice.
2. What is meant by maintaining force competencies in port
security?
The easiest way for me to explain maintaining
competencies is to look at it from the point of view of a railroad
employee on the extra board. The railroad maintains a list of
employees that fill in for the regularly assigned employee that
is unable to make it to work. Therefore, these employees must
be trained on the competencies of a variety of different jobs,
and can work these jobs if a vacancy needs to be filled day or
night. A port security team must continually train on different
emergency scenarios to ensure they are ready at a moment’s
notice. By maintaining security force competencies, each
member of the team could feel each other’s roles as necessary in
a critical situation. As our lesson points out, a plethora of
different scenarios should be worked into the core competency
training. The greater the number of training scenarios the better
prepared the security team will be in the event of an emergency
situation.
Framework. (n.d.). Retrieved April 05, 2017, from
https://www.merriam-webster.com/dictionary/framework
Shawna Robles
Review DNI WTA's for 2015 and 2016 (see attached). Compare
and contrast all the threat[s] as the DNI saw them last year and
what he sees this year? This is more than just a list.
Why the change? [Assume what’s addressed first is first priority
and what’s addressed last is last].
Cyber
Cyber and Technology
Counterintelligence
Terrorism
Terrorism
WMD and Proliferation
WMD and Proliferation
Space/Counterspace
Space/Counterspace
Counterintelligence
Transnational Organized Crime
Transnational Organized Crime
Economics and Natural Resources
Economics and Natural Resources
Human Security
Human Security
When comparing and contrasting World Threat Assessments
from 2015 and 2016, it is easy to see that many of the areas of
concern and focus have stayed relatively the same. Looking at
the lists, some of the priorities have changed as far order of
merit. The regional threats have also changed quite a bit as far
as who has become a top priority and which countries remain
threats or who has been removed as a threat. Regional threats
will change according to which country poses the biggest threat
to the U.S. and national security at the time. Currently, East
Asia tops the list for threats due to North Korea’s threats of
WMD. In 2015, The Middle East was at the top due to the
gaining momentum ISIS had in Iraq.
Cyber was named the top priority for both 2015 and 2016 with
2016 adding technology into the mix. In 2015, the DNI stated
that “politically motivated cyber-attacks are now a growing
reality, and foreign actors are reconnoitering and developing
access to US critical infrastructure systems, which might be
quickly exploited for disruption if an adversary’s intent became
hostile (Clapper, 2015 p. 2). For 2016, a major focus for the
cyber/technology is artificial intelligence decision making
process. Counterintel was higher on the list in 2015 due to the
ongoing threats Russia and China provided. As the time, the
U.S. was considered a bigger threat to Iran, prompting them to
state that they could continue to monitor the U.S. involvement
overseas. For 2016, counterintel was lower on the list with
Russia and China still being major players, however, growing
threats and concerns from other areas ended up being higher
priority on the list due to the severity of potential attacks.
Terrorism is the second highest priority for 2016 due to the
increase of attacks by ISIS/ISIL and the involvement of the U.S.
in Iraq and other Middle Eastern countries. In 2015, ISIL/ISIS
was a growing concern but has not become a full-fledged
problem until 2016 when they gained momentum and took over
cities the U.S. has once liberated. WMD/Proliferation has
become a bigger issue in 2016 due to the continuous threats
from North Korea. In 2015, North Korea was in the process of
developing WMD capabilities. Last year, North Korea started
to focus more on testing ballistic missiles and distances. Syria
and Iraq have proven WMDs still remain in their countries.
Space and counterspace was a bigger focus in 2016 than 2016
due to more participation and interest in space operations from
countries which could be potentially dangerous to U.S.
operations. The increased interest in satellite imagery, weather
operations, communications, etc could be effective at
monitoring military operations. This could also be detrimental
to U.S. forces. The last three areas: transnational organized
crime, economics and natural resources and human security
remain the same regarding their position on the priority list.
Clapper, J. R., & United States. (2015). Statement for the record
on the worldwide threat assessment of the US intelligence
community, Senate Select Committee on Intelligence.
Washington, D.C.: Office of the Director of National
Intelligence.
tyler stivers
The first threat that the DNI discusses is certainly one of the
most concerning. Cyber threats to the private sector and
national critical infrastructure are continually increasing.
Callap (2015) states that “Despite ever-improving network
defenses, the divers possibilities for remote hacking intrusions,
supply chain operations to insert compromised hardware or
software, and malevolent activities by human insiders will hold
nearly all ICT systems at risk for years to come” (p1).
Furthermore the DNI discusses the threats to personal data and
data systems by a wide variety of potential actors. Including
state supported organizations and states themselves. In 2016
the DNI discussed this threat in very much the same way, but
included the threat to personal technology such as cars, phones,
and other electronic devices. The DNI believes that these
devices and sensitive databases are higher priority target than
infrastructure systems. Comparatively the cyber threat has not
changed much from 2015 to 2016. There were simply more
vulnerabilities discussed in the 2016 report. Specifically,
Internet of things, Foreign data science Augmented reality and
Virtual reality.
The next threat the DNI discusses is
counterintelligence. Similar to the cyber threat, counter
intelligence involves the covert access of national security
information. Clapper (2015) identifies that “propriety
information form US companies and research institution dealing
with defense, energy, finance, dual-use technology” (p.4) will
also be targets or foreign intelligence entities. In 2016 there
was a distinct shift in his interpretation of the
counterintelligence threat. Rather than simply accessing
information as discussed in 2015, the 2016 analysis include the
goal of “influencing the US national decision-making
apparatus”(p.10) This was evident by report of attempted or
actual access of US election systems by Russia. The DNI also
included the threat of foreign intelligence services recruitment
of “insiders” to obtain US government information without
authorization. In my opinion the tone of counterintelligence
threat analysis in the DNI 2016 report sounds very similar to
counterintelligence threats faced in the cold war.
The DNIs analysis of the terrorism threat was mainly
the same in 2015 and 2016. However in 2016, the DNI further
discusses al-Qai’ida’s advancements in Yemen specifically.
Additionally, the 2016 report identifies the success of terrorist
organizations recruitment of individuals proficient in
information technology, social media, and online research.
Furthermore, the exploitation of social media by these
organizations was covered in the 2016 report. The terrorism
threat has not changes to a great degree in the past decade aside
from the rise of ISIL.
The only difference in the DNIs analysis of WMD
threat was the including of Genome Editing in the 2016 report.
The analysis was fairly vague however Clapper (2016) stated
that this type of research by “countries with different regulatory
or ethical standards than those of Western Countries probably
increases the risk of the creation of potentially harmful
biological agents or products” (p. 9) Both the 2015 and 2016
reports include the threats from WMD countries (Russia, China,
Iran, North Korea). Generally, these countries specifically
North Korea continue to develop their WMD programs and
increasing the threat.
The DNIs analysis of the remaining threats; Space
and counterspace, traditional organized crime, economics and
natural resources, and human security remained mostly
consistent form the 2015 and 2016 reports. In summary, humans
will continue to face epidemic, pandemic and natural disaster.
The DNI identified in the 2016 reports that abnormal weather
patterns severe weather situations will become more common.
As space systems advance they will become targets of
disruption by
competitive nations. Drug trafficking remains a major threat and
“undermines US interest abroad”(clapper, 2015)
Clapper, J. (2015) “Worldwide Threat Assessment of the US
Intelligence Community”. Senate Armed Services Committee.
Retrieved from
https://edge.apus.edu/access/content/attachment/344535/Forums
/1dc217fd-c685-42ad-9207-
3733ec36896c/DNI_2015_ATA_SFR_-_SASC_FINAL.pdf.
Clapper, J (2016) “Worldwide Threat Assessment of the US
Intelligence Community”. Senate Armed Services Committee.
Retrieved from
https://edge.apus.edu/access/content/attachment/344535/Forums
/731da771-64ad-4537-b9c7-
f4b00f2bfe3c/SASC_Unclassified_2016_ATA_SFR_FINAL.pdf

More Related Content

Similar to LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx

Document 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docxDocument 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docxelinoraudley582231
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxwrite31
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docx4934bk
 
20160224-AQ-ASI
20160224-AQ-ASI20160224-AQ-ASI
20160224-AQ-ASIaugmentiq
 
Security_Quarterly_magazine_August_2015
Security_Quarterly_magazine_August_2015Security_Quarterly_magazine_August_2015
Security_Quarterly_magazine_August_2015Siobhan Spiak
 
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docxRunning head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docxtodd521
 
The United States Navy
The United States NavyThe United States Navy
The United States NavyKatie Gulley
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. TakishaPeck109
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. ariysn
 
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...Mighty Guides, Inc.
 
Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaGhader Ahmadi
 
Here are 4 discussion responses and 2 program reflections made by .docx
Here are 4 discussion responses and 2 program reflections made by .docxHere are 4 discussion responses and 2 program reflections made by .docx
Here are 4 discussion responses and 2 program reflections made by .docxpooleavelina
 
1242019 SafeAssign Originality Reporthttpsucumberland.docx
1242019 SafeAssign Originality Reporthttpsucumberland.docx1242019 SafeAssign Originality Reporthttpsucumberland.docx
1242019 SafeAssign Originality Reporthttpsucumberland.docxaulasnilda
 
Qantas Assignment By Gems Essay
Qantas Assignment By Gems EssayQantas Assignment By Gems Essay
Qantas Assignment By Gems EssaySusan Kennedy
 

Similar to LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx (20)

Document 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docxDocument 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docx
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docx
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docx
 
20160224-AQ-ASI
20160224-AQ-ASI20160224-AQ-ASI
20160224-AQ-ASI
 
Security_Quarterly_magazine_August_2015
Security_Quarterly_magazine_August_2015Security_Quarterly_magazine_August_2015
Security_Quarterly_magazine_August_2015
 
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docxRunning head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
 
The United States Navy
The United States NavyThe United States Navy
The United States Navy
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 
Patrick_Wayne_Cooper_Graphic_CV_2024.pdf
Patrick_Wayne_Cooper_Graphic_CV_2024.pdfPatrick_Wayne_Cooper_Graphic_CV_2024.pdf
Patrick_Wayne_Cooper_Graphic_CV_2024.pdf
 
Resume
ResumeResume
Resume
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
 
Cyberthreat Defense Report Edge 2017-cdr-report
Cyberthreat Defense Report Edge 2017-cdr-reportCyberthreat Defense Report Edge 2017-cdr-report
Cyberthreat Defense Report Edge 2017-cdr-report
 
Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by Impreva
 
Here are 4 discussion responses and 2 program reflections made by .docx
Here are 4 discussion responses and 2 program reflections made by .docxHere are 4 discussion responses and 2 program reflections made by .docx
Here are 4 discussion responses and 2 program reflections made by .docx
 
1242019 SafeAssign Originality Reporthttpsucumberland.docx
1242019 SafeAssign Originality Reporthttpsucumberland.docx1242019 SafeAssign Originality Reporthttpsucumberland.docx
1242019 SafeAssign Originality Reporthttpsucumberland.docx
 
Qantas Assignment By Gems Essay
Qantas Assignment By Gems EssayQantas Assignment By Gems Essay
Qantas Assignment By Gems Essay
 
Example Of Platform Iot
Example Of Platform IotExample Of Platform Iot
Example Of Platform Iot
 
2016_HILL_RESUME_FINAL
2016_HILL_RESUME_FINAL2016_HILL_RESUME_FINAL
2016_HILL_RESUME_FINAL
 

More from smile790243

PART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docxPART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docxsmile790243
 
Part C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docxPart C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docxsmile790243
 
PART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docxPART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docxsmile790243
 
Part 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docxPart 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docxsmile790243
 
PART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docxPART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docxsmile790243
 
Part A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docxPart A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docxsmile790243
 
PART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docxPART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docxsmile790243
 
Part A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docxPart A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docxsmile790243
 
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docxPart A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docxsmile790243
 
Part A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docxPart A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docxsmile790243
 
Part 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docxPart 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docxsmile790243
 
Part A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docxPart A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docxsmile790243
 
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docxPart 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docxsmile790243
 
Part 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docxPart 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docxsmile790243
 
Part 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docxPart 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docxsmile790243
 
Part 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docxPart 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docxsmile790243
 
Part 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docxPart 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docxsmile790243
 
Part 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docxPart 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docxsmile790243
 
Part 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docxPart 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docxsmile790243
 
Part 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docxPart 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docxsmile790243
 

More from smile790243 (20)

PART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docxPART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docx
 
Part C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docxPart C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docx
 
PART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docxPART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docx
 
Part 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docxPart 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docx
 
PART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docxPART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docx
 
Part A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docxPart A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docx
 
PART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docxPART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docx
 
Part A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docxPart A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docx
 
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docxPart A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
 
Part A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docxPart A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docx
 
Part 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docxPart 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docx
 
Part A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docxPart A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docx
 
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docxPart 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
 
Part 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docxPart 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docx
 
Part 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docxPart 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docx
 
Part 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docxPart 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docx
 
Part 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docxPart 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docx
 
Part 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docxPart 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docx
 
Part 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docxPart 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docx
 
Part 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docxPart 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docx
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx

  • 1. LEE JACOB GARCIA Hello Classmates, 1. Describe the framework for managing and leading a security force. The framework for managing and leading a security force starts with the port managers and leaders. The key to establishing this framework within the port security organization is in how well the leadership develops the middle management function (Christopher, 2014). The best tool that may be utilized is the use of "middle-managers", middle-managers can be the "go to" individual where in fact, they become the liaison between the front line workers and upper management. When developing middle managers, senior leaderships must ensure they understand and have the full expectations of the Organization’s intent, mission, and goals, in order for middle managers filter this down to the operational levels, where the actual work of port security gets done. In the military, these positions are what we call Team Leaders, senior leaders mentor and develop Team Leaders in order for the team to achieve success with their everyday mission or goals. Team Leaders must understand the Organization’s intent, mission, goals, regulations, policies, and procedures in order to better guide their Soldiers. Team Leaders are the keen advocate for the Soldiers because they interact more with the Soldiers and guide them to ensure standards are being met. They achieve this through active engagement and constant evaluations of their work performance and their professional/personal development. One of the main role of middle-manager is to ensure that issues from subordinates are brought up the chain of command and these middle-managers can solicit input from employees and act accordingly to ensure policy reflects the wishes of the employees. Employee input is crucial to make this type of work model productive. Leadership skills are then exercised and exploited by acting accordingly on these issues in their level, if
  • 2. issues are of higher concerns, this is when middle managers raises these issues to senior leaderships to get some answers. 2. What is meant by maintaining force competencies in port security? Maintaining force competencies is for port security management to assess the level of competency of the security workforce. It is important that the port security management team maintain force competencies and asses if the workforce has adequate training required in order for them to do their job. Understanding the type of training required is crucial for port security management to know hence, security management would know what qualifications and training is needed. Each training requirement and certifications may vary depending on the capacity of their job and expected to perform. The importance is to asses if the workforce are qualified to perform their duties as expected. Validation and assessment of training and certifications must be done frequently depending on what is established or outlined based on the Standard Operating Procedures (SOP). SOP entails detailed or specific guidance relating to each specific duties, objectives, or policies. Jake Reference Christopher, K. (2014). Port Security Management, Second Edition. Bosa Roca: CRC Press. Retrieved from http://ebookcentral.proquest.com.ezproxy2.apus.edu/lib/apus/de tail. action?docID=1578619 Todd Stevenson 1. Describe the framework for managing and leading a security force. To better understand the question let's first look at the definition of framework. According to the Merriam-Webster dictionary, framework is defined as “(a): a basic conceptional
  • 3. structure (as of ideas), and (b): a skeletal, openwork, or structural frame” (Merriam-Webster, n.d.). With that said, to me framework is the basic structure that holds everything together. This is true whether we’re talking about computer software, a treehouse, your home, or even a game you’re playing. Framework is the very building blocks our everyday lives are built around. Just as our lesson has pointed out, the framework for managing or leading a security force to protect our ports starts with port managers and leaders. One of the more important framework tasks for managers and leaders of a port security force is ensuring all participants are on the same page and acting as a single organism. Per this week’s lesson, middle- management plays a key role in the framework of a port security team’s ability to communicate with upper management. It is through middle-management a port security team can get a clear understanding of the strategic plan, mission, values, and required tasks. A strong foundation or framework is crucial to building a cohesive security force that’s on the same page, and an understanding of the management team’s strategic plan, and mission statement. It is a strong framework that allows a security force the ability to execute a port’s emergency strategies on a moment’s notice. 2. What is meant by maintaining force competencies in port security? The easiest way for me to explain maintaining competencies is to look at it from the point of view of a railroad employee on the extra board. The railroad maintains a list of employees that fill in for the regularly assigned employee that is unable to make it to work. Therefore, these employees must be trained on the competencies of a variety of different jobs, and can work these jobs if a vacancy needs to be filled day or night. A port security team must continually train on different emergency scenarios to ensure they are ready at a moment’s notice. By maintaining security force competencies, each member of the team could feel each other’s roles as necessary in
  • 4. a critical situation. As our lesson points out, a plethora of different scenarios should be worked into the core competency training. The greater the number of training scenarios the better prepared the security team will be in the event of an emergency situation. Framework. (n.d.). Retrieved April 05, 2017, from https://www.merriam-webster.com/dictionary/framework Shawna Robles Review DNI WTA's for 2015 and 2016 (see attached). Compare and contrast all the threat[s] as the DNI saw them last year and what he sees this year? This is more than just a list. Why the change? [Assume what’s addressed first is first priority and what’s addressed last is last]. Cyber Cyber and Technology Counterintelligence Terrorism Terrorism WMD and Proliferation WMD and Proliferation Space/Counterspace Space/Counterspace Counterintelligence Transnational Organized Crime Transnational Organized Crime Economics and Natural Resources Economics and Natural Resources Human Security Human Security
  • 5. When comparing and contrasting World Threat Assessments from 2015 and 2016, it is easy to see that many of the areas of concern and focus have stayed relatively the same. Looking at the lists, some of the priorities have changed as far order of merit. The regional threats have also changed quite a bit as far as who has become a top priority and which countries remain threats or who has been removed as a threat. Regional threats will change according to which country poses the biggest threat to the U.S. and national security at the time. Currently, East Asia tops the list for threats due to North Korea’s threats of WMD. In 2015, The Middle East was at the top due to the gaining momentum ISIS had in Iraq. Cyber was named the top priority for both 2015 and 2016 with 2016 adding technology into the mix. In 2015, the DNI stated that “politically motivated cyber-attacks are now a growing reality, and foreign actors are reconnoitering and developing access to US critical infrastructure systems, which might be quickly exploited for disruption if an adversary’s intent became hostile (Clapper, 2015 p. 2). For 2016, a major focus for the cyber/technology is artificial intelligence decision making process. Counterintel was higher on the list in 2015 due to the ongoing threats Russia and China provided. As the time, the U.S. was considered a bigger threat to Iran, prompting them to state that they could continue to monitor the U.S. involvement overseas. For 2016, counterintel was lower on the list with Russia and China still being major players, however, growing threats and concerns from other areas ended up being higher priority on the list due to the severity of potential attacks.
  • 6. Terrorism is the second highest priority for 2016 due to the increase of attacks by ISIS/ISIL and the involvement of the U.S. in Iraq and other Middle Eastern countries. In 2015, ISIL/ISIS was a growing concern but has not become a full-fledged problem until 2016 when they gained momentum and took over cities the U.S. has once liberated. WMD/Proliferation has become a bigger issue in 2016 due to the continuous threats from North Korea. In 2015, North Korea was in the process of developing WMD capabilities. Last year, North Korea started to focus more on testing ballistic missiles and distances. Syria and Iraq have proven WMDs still remain in their countries. Space and counterspace was a bigger focus in 2016 than 2016 due to more participation and interest in space operations from countries which could be potentially dangerous to U.S. operations. The increased interest in satellite imagery, weather operations, communications, etc could be effective at monitoring military operations. This could also be detrimental to U.S. forces. The last three areas: transnational organized crime, economics and natural resources and human security remain the same regarding their position on the priority list. Clapper, J. R., & United States. (2015). Statement for the record on the worldwide threat assessment of the US intelligence community, Senate Select Committee on Intelligence. Washington, D.C.: Office of the Director of National Intelligence. tyler stivers The first threat that the DNI discusses is certainly one of the most concerning. Cyber threats to the private sector and national critical infrastructure are continually increasing. Callap (2015) states that “Despite ever-improving network defenses, the divers possibilities for remote hacking intrusions, supply chain operations to insert compromised hardware or software, and malevolent activities by human insiders will hold nearly all ICT systems at risk for years to come” (p1).
  • 7. Furthermore the DNI discusses the threats to personal data and data systems by a wide variety of potential actors. Including state supported organizations and states themselves. In 2016 the DNI discussed this threat in very much the same way, but included the threat to personal technology such as cars, phones, and other electronic devices. The DNI believes that these devices and sensitive databases are higher priority target than infrastructure systems. Comparatively the cyber threat has not changed much from 2015 to 2016. There were simply more vulnerabilities discussed in the 2016 report. Specifically, Internet of things, Foreign data science Augmented reality and Virtual reality. The next threat the DNI discusses is counterintelligence. Similar to the cyber threat, counter intelligence involves the covert access of national security information. Clapper (2015) identifies that “propriety information form US companies and research institution dealing with defense, energy, finance, dual-use technology” (p.4) will also be targets or foreign intelligence entities. In 2016 there was a distinct shift in his interpretation of the counterintelligence threat. Rather than simply accessing information as discussed in 2015, the 2016 analysis include the goal of “influencing the US national decision-making apparatus”(p.10) This was evident by report of attempted or actual access of US election systems by Russia. The DNI also included the threat of foreign intelligence services recruitment of “insiders” to obtain US government information without authorization. In my opinion the tone of counterintelligence threat analysis in the DNI 2016 report sounds very similar to counterintelligence threats faced in the cold war. The DNIs analysis of the terrorism threat was mainly the same in 2015 and 2016. However in 2016, the DNI further discusses al-Qai’ida’s advancements in Yemen specifically. Additionally, the 2016 report identifies the success of terrorist organizations recruitment of individuals proficient in information technology, social media, and online research.
  • 8. Furthermore, the exploitation of social media by these organizations was covered in the 2016 report. The terrorism threat has not changes to a great degree in the past decade aside from the rise of ISIL. The only difference in the DNIs analysis of WMD threat was the including of Genome Editing in the 2016 report. The analysis was fairly vague however Clapper (2016) stated that this type of research by “countries with different regulatory or ethical standards than those of Western Countries probably increases the risk of the creation of potentially harmful biological agents or products” (p. 9) Both the 2015 and 2016 reports include the threats from WMD countries (Russia, China, Iran, North Korea). Generally, these countries specifically North Korea continue to develop their WMD programs and increasing the threat. The DNIs analysis of the remaining threats; Space and counterspace, traditional organized crime, economics and natural resources, and human security remained mostly consistent form the 2015 and 2016 reports. In summary, humans will continue to face epidemic, pandemic and natural disaster. The DNI identified in the 2016 reports that abnormal weather patterns severe weather situations will become more common. As space systems advance they will become targets of disruption by competitive nations. Drug trafficking remains a major threat and “undermines US interest abroad”(clapper, 2015) Clapper, J. (2015) “Worldwide Threat Assessment of the US Intelligence Community”. Senate Armed Services Committee. Retrieved from https://edge.apus.edu/access/content/attachment/344535/Forums /1dc217fd-c685-42ad-9207- 3733ec36896c/DNI_2015_ATA_SFR_-_SASC_FINAL.pdf. Clapper, J (2016) “Worldwide Threat Assessment of the US Intelligence Community”. Senate Armed Services Committee.