SlideShare a Scribd company logo
1 of 6
Running Head: RECONNAISSANCE PLAN
RECONNAISSANCE PLAN
Human Reconnaissance Report
Name
CJ-468
Date
NAME: __________________________
DATE: ________________________
AGENCY: Southern New Hampshire University Intelligence
Agency
(WHO – delete me) Mr. John Doe of address unknown is
suspected of terroristic acts against the citizens of the United
States of America. Intelligence has revealed that further steps
are required to determine Doe’s intentions. As it stands now, his
actions are detrimental to the safety of this nation and the
citizens who live in it.
(WHAT – delete me) Four investigators and four unmarked
vehicles (varied makes and models) will provide reconnaissance
(stakeout or follow) on Doe’s red 2000 Chevrolet C-1500
pickup truck, Georgia license number 2234JD.
(WHEN – delete me) The four investigators have to be in place
and functional within 24 hours of this reconnaissance request
due to the impending terrorist actions it is believed Doe will
perpetrate within 48 hours from now.
(WHERE – delete me) According to intelligence, Doe’s pickup
truck is parked at 2900 Lincoln Drive, Brunswick, GA each day
from 7:00 p.m. to 11:00 p.m.
(WHY – delete me) Four investigators following and staking out
Doe’s vehicle will give law enforcement the opportunity to
closely follow Doe throughout each day in order to determine
Doe’s intentions. According to the intelligence, Doe has three
accomplices who have yet to be identified. A reconnaissance
team could help investigators find and later identify the
accomplices as well as determine if Doe’s actions will lead to
terroristic acts.
(HOW – delete me) On (add today’s date) at 30 minutes past
sunset (approximately 7:45 p.m.), investigators will set up
reconnaissance around Doe’s home located at 2900 Lincoln
Drive, Brunswick, GA. Investigators will provide mobile or
stationary reconnaissance on Doe as he lives his life.
Investigators should record all activities for future review. This
reconnaissance assignment will last for four complete days or
until enough evidence is obtained to make an arrest.
(RESOURCE PLAN – delete me) In summary of the above-
mentioned, I requested the following….
Signature of Agent__________________________
Printed Name of Agent__________________________
Resources/ Works Cited:
(Three are required)
//////////////////////////////////////FOR TRAINING PURPOSES
ONLY//////////////////////////////////////
Intelligence Report (Executive Summary)
Tina Copes
Instructor Jared Browne
CJ468 Intelligence and Surveillance
March 19, 2019
Intelligence Report
2
Sources used
1. Intelligence report from North-East Florida Fusion Center
Date: 27th-30th August 2019
North-East Florida Fusion Center
2. Intelligence report from Central Florida Intelligence
Exchange (CFIX)
Date: 4th September 2019
US Customs and Border Protection (CBP)
3. Intelligence report from HQ US NORTHCOM Force
Protection
Date: 14th September 2019
US NORTHCOM Force Protection
Intelligence Report
The targets are 3 men who are all wanted men for several crimes
in the U.S. and around the world. The first is one Noor Aziz
Uddin, a 50 year old wanted man wanted for international
telecommunication schemes that defrauded individuals,
companies and governments. It was also complicit with a
criminal organization that extends into Euro-Asia such as
Pakistan, Saudi Arabia, Philippines, Singapore, Switzerland,
Spain, Italy and Malaysia. He is also reported to have a sister-
in-law who resides in Phoenix, Arizona. The second target is
Sun Kailiang who is an officer in Unit 61398 of the 3rd
Department of the Chinese People’s Liberation Army (PLA) and
is wanted for carrying out cyber-attacks that targeted a nuclear
power plant and 6 U.S. companies. The final target is one Adam
Gadahn who is a 28 year old Californian wanted of federal
charges of treason and abetting a terrorist group by making
propaganda videos for support of Al-Qaeda. Earlier reports on
the 29th of May record an unusual purchase of large quantities
of fertilizer out of Henderson, Nevada, with irregularities in the
payment procedure by Mr. Gadahn (Northeast Florida Fusion
Center, 2019).
On June 17th 2019, the International Mail Facility in Miami,
Florida, located pictures of the Hoover Dam sent from a town in
the outskirts of Islamabad, Pakistan. These were addressed to
Ms. Mary Lou, the identified sister-in-law to Mr. Noor Aziz
Uddin. The target group was identified when they entered the
lobby of a casino in Las Vegas, Nevada at around 1600hrs on
August 25th. The three men have never been spotted together
before and this was their first sighting as a group (CFIX &
Exchange, 2019). Their suspicious behavior caught the attention
of the bartender who, alongside security, made sure to keep
close tabs on the trio and managed to collect some evidence
during their stay and after their departure at 1740hrs on the
same day. Tennessee Valley Authority reported a solo white
male to be taking photos for an extended length of time on
September the 30th. On December 4th, a video feed was
intercepted which featured Sun Kailiang that speaks of brothers
of all color uniting for a cause and a great day for the world that
is soon dawning. References to the season of giving for the
Christians was also referenced in the call. LAPD made contact
with Mr. Gadahn where they issued him a ticket for running a
red light. He was driving a 1999 international 3 ton white truck
with a dent on the front quarter panel (USNorthcomm Force
Protection, 2019).
According to the Intelligence reports gathered, the following
executive summary is made:
There is a possible attack planned on the Hoover Dam in
Florida. This is inferred from the repetitive mention of the term
“dam” in their first meeting at the Casino lobby. It is further
corroborated by the images sent by Noor to his sister-in-law in
Phoenix, Arizona, and the reports of the lone white man taking
photos over an extended period of time. The attack could
possibly be a bomb attack on the dam with the intent to cause
damage to the lives and property in the surrounding areas. This
is supported by the large quantities of fertilizer acquired by
Gadahn as well as the barrels that Gadahn was in possession of
in the truck he was stopped in by the LAPD as fertilizer is a
requisite in the making of a number of “home-made”/ self-made
explosives. The attack is expected during the period of the
Christmas holidays. This is supported by the intercepted video
feed where Mr. Sun Kailiang on December 4th. Owing to this,
there is a need to put a high alert on the targets with a
“SEVERE” threat level on the Security Advisory System. This
is due to the potential threat level in terms of possible damage
by the attack as well as the short time period left before the date
of the possible attack being Christmas and the current date of
this report’s conception being past the 4th of December.
Surveillance and Reconnaissance Plan
It is of utmost importance to keep the targets under a keen
watchful eye to make sure their planned attack does not
materialize. The SR plan must also be incognito so as to not
provoke the targets into executing ulterior or alternate plans to
compensate. The process must also be done legally to ensure the
prosecution of offenders is not stalled by legal procedure on the
legality of surveillance process (Types of Surveillance in
Criminal Investigations, 2018).
The proposed SR plan aims to combine two surveillance
techniques; fixed surveillance and electronic monitoring. Fixed
surveillance is essential for this as it is dependent on the close
monitoring of the targets’ activities from a set position. This
can be done via setting up surveillance in a vehicle around the
target bases or in this case can even require the need to set up
the surveillance in a neighboring house. Two-person
surveillance is best for its allowance of officers to relieve each
other of duty and keep watch over the targets in shifts.
Electronic monitoring in this case will allow the officers to
intercept communication between the targets. This has been
employed once before in the interception on the Sun Kailiang
video feed and resulted in the acquisition of very important
information. This can very well keep the officers steps ahead of
the targets and ensure the operation’s success in curbing the
attack as useful information such as time of the attack can be
founded. It may also provide evidence that can be used at
prosecution. For this to be legal, a court order is required before
it can be launched.
2
References
CFIX, & Exchange, C. F. (2019). Intelligence Bulletin. Florida:
Central Florida Intelligence Exchange.
Northeast Florida Fusion Center. (2019). Suspicious Activity
Reports (SARs). Florida: Northeast Florida Fusion Center.
Types of Surveillance in Criminal Investigations. (2018, July
1). Retrieved from Chron: https://work.chron.com/types-
surveillance-criminal-investigations-9434.html
USNorthcomm Force Protection. (2019). USNorthcomm Force
Protection Anti-terrorism Instruction. New Hampshire:
USNorthcomm Force Protection.
i

More Related Content

Similar to Running Head RECONNAISSANCE PLANRECONNAISSANCE PLAN.docx

Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-two
screaminc
 
Qusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdfQusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdf
faisalbags
 
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docxRiley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
joellemurphey
 
Nsa responds snowden media contacts with usg
Nsa responds  snowden media contacts with usgNsa responds  snowden media contacts with usg
Nsa responds snowden media contacts with usg
AnonDownload
 
Nsa responds snowden media contacts with usg
Nsa responds  snowden media contacts with usgNsa responds  snowden media contacts with usg
Nsa responds snowden media contacts with usg
AnonDownload
 
Nsa responds snowden media run-bys with usg
Nsa responds  snowden media run-bys with usgNsa responds  snowden media run-bys with usg
Nsa responds snowden media run-bys with usg
AnonDownload
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
teresehearn
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
debishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ronnasleightholm
 
Handouts for Spoliation of Evidence
Handouts for Spoliation of EvidenceHandouts for Spoliation of Evidence
Handouts for Spoliation of Evidence
Gino Forte
 
Approved for Public Distribution Distribution Unlimited Def.docx
Approved for Public Distribution Distribution Unlimited Def.docxApproved for Public Distribution Distribution Unlimited Def.docx
Approved for Public Distribution Distribution Unlimited Def.docx
rossskuddershamus
 

Similar to Running Head RECONNAISSANCE PLANRECONNAISSANCE PLAN.docx (20)

Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-two
 
The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
 
Qusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdfQusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdf
 
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docxRiley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
 
Trump 2018 internet research-agency_indictment
Trump 2018   internet research-agency_indictmentTrump 2018   internet research-agency_indictment
Trump 2018 internet research-agency_indictment
 
Nsa responds snowden media contacts with usg
Nsa responds  snowden media contacts with usgNsa responds  snowden media contacts with usg
Nsa responds snowden media contacts with usg
 
Nsa responds snowden media contacts with usg
Nsa responds  snowden media contacts with usgNsa responds  snowden media contacts with usg
Nsa responds snowden media contacts with usg
 
Nsa responds snowden media run-bys with usg
Nsa responds  snowden media run-bys with usgNsa responds  snowden media run-bys with usg
Nsa responds snowden media run-bys with usg
 
Us9af 000762dp
Us9af 000762dpUs9af 000762dp
Us9af 000762dp
 
Police can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme CourtPolice can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme Court
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
 
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Criminal Summons.pdf
Criminal Summons.pdfCriminal Summons.pdf
Criminal Summons.pdf
 
Handouts for Spoliation of Evidence
Handouts for Spoliation of EvidenceHandouts for Spoliation of Evidence
Handouts for Spoliation of Evidence
 
Approved for Public Distribution Distribution Unlimited Def.docx
Approved for Public Distribution Distribution Unlimited Def.docxApproved for Public Distribution Distribution Unlimited Def.docx
Approved for Public Distribution Distribution Unlimited Def.docx
 
Us9af 001030dp
Us9af 001030dpUs9af 001030dp
Us9af 001030dp
 
THE OBSTRUCTION OF THE RULE OF LAW
THE OBSTRUCTION OF THE RULE OF LAWTHE OBSTRUCTION OF THE RULE OF LAW
THE OBSTRUCTION OF THE RULE OF LAW
 

More from todd581

Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
todd581
 
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docxRunning head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
todd581
 
Running head PHASE 2 1PH.docx
Running head PHASE 2                                       1PH.docxRunning head PHASE 2                                       1PH.docx
Running head PHASE 2 1PH.docx
todd581
 
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docxRunning head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
todd581
 
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docxRunning head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
todd581
 
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docxRunning Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
todd581
 
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docxRunning Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
todd581
 
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docxRunning Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
todd581
 
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docxRUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
todd581
 
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docxRunning head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
todd581
 
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docxRunning Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
todd581
 
Running head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docxRunning head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docx
todd581
 
Running head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docxRunning head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docx
todd581
 
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docxRunning head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
todd581
 
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docxRunning head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
todd581
 
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docxRunning head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
todd581
 
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docxRunning Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
todd581
 
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docxRunning head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
todd581
 
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docxRunning head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
todd581
 

More from todd581 (20)

Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
 
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docxRunning head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
 
Running head PHASE 2 1PH.docx
Running head PHASE 2                                       1PH.docxRunning head PHASE 2                                       1PH.docx
Running head PHASE 2 1PH.docx
 
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docxRunning head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
 
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docxRunning head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
 
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docxRunning Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
 
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docxRunning Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
 
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docxRunning Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
 
Running head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD .docx
Running head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD           .docxRunning head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD           .docx
Running head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD .docx
 
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docxRUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
 
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docxRunning head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
 
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docxRunning Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
 
Running head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docxRunning head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docx
 
Running head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docxRunning head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docx
 
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docxRunning head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
 
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docxRunning head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
 
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docxRunning head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
 
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docxRunning Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
 
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docxRunning head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
 
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docxRunning head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Running Head RECONNAISSANCE PLANRECONNAISSANCE PLAN.docx

  • 1. Running Head: RECONNAISSANCE PLAN RECONNAISSANCE PLAN Human Reconnaissance Report Name CJ-468 Date NAME: __________________________ DATE: ________________________ AGENCY: Southern New Hampshire University Intelligence Agency (WHO – delete me) Mr. John Doe of address unknown is suspected of terroristic acts against the citizens of the United States of America. Intelligence has revealed that further steps are required to determine Doe’s intentions. As it stands now, his actions are detrimental to the safety of this nation and the citizens who live in it. (WHAT – delete me) Four investigators and four unmarked vehicles (varied makes and models) will provide reconnaissance (stakeout or follow) on Doe’s red 2000 Chevrolet C-1500 pickup truck, Georgia license number 2234JD. (WHEN – delete me) The four investigators have to be in place and functional within 24 hours of this reconnaissance request due to the impending terrorist actions it is believed Doe will
  • 2. perpetrate within 48 hours from now. (WHERE – delete me) According to intelligence, Doe’s pickup truck is parked at 2900 Lincoln Drive, Brunswick, GA each day from 7:00 p.m. to 11:00 p.m. (WHY – delete me) Four investigators following and staking out Doe’s vehicle will give law enforcement the opportunity to closely follow Doe throughout each day in order to determine Doe’s intentions. According to the intelligence, Doe has three accomplices who have yet to be identified. A reconnaissance team could help investigators find and later identify the accomplices as well as determine if Doe’s actions will lead to terroristic acts. (HOW – delete me) On (add today’s date) at 30 minutes past sunset (approximately 7:45 p.m.), investigators will set up reconnaissance around Doe’s home located at 2900 Lincoln Drive, Brunswick, GA. Investigators will provide mobile or stationary reconnaissance on Doe as he lives his life. Investigators should record all activities for future review. This reconnaissance assignment will last for four complete days or until enough evidence is obtained to make an arrest. (RESOURCE PLAN – delete me) In summary of the above- mentioned, I requested the following…. Signature of Agent__________________________ Printed Name of Agent__________________________ Resources/ Works Cited: (Three are required) //////////////////////////////////////FOR TRAINING PURPOSES ONLY//////////////////////////////////////
  • 3. Intelligence Report (Executive Summary) Tina Copes Instructor Jared Browne CJ468 Intelligence and Surveillance March 19, 2019 Intelligence Report 2 Sources used 1. Intelligence report from North-East Florida Fusion Center Date: 27th-30th August 2019 North-East Florida Fusion Center 2. Intelligence report from Central Florida Intelligence Exchange (CFIX) Date: 4th September 2019 US Customs and Border Protection (CBP) 3. Intelligence report from HQ US NORTHCOM Force Protection Date: 14th September 2019 US NORTHCOM Force Protection Intelligence Report The targets are 3 men who are all wanted men for several crimes in the U.S. and around the world. The first is one Noor Aziz Uddin, a 50 year old wanted man wanted for international telecommunication schemes that defrauded individuals, companies and governments. It was also complicit with a criminal organization that extends into Euro-Asia such as Pakistan, Saudi Arabia, Philippines, Singapore, Switzerland, Spain, Italy and Malaysia. He is also reported to have a sister- in-law who resides in Phoenix, Arizona. The second target is
  • 4. Sun Kailiang who is an officer in Unit 61398 of the 3rd Department of the Chinese People’s Liberation Army (PLA) and is wanted for carrying out cyber-attacks that targeted a nuclear power plant and 6 U.S. companies. The final target is one Adam Gadahn who is a 28 year old Californian wanted of federal charges of treason and abetting a terrorist group by making propaganda videos for support of Al-Qaeda. Earlier reports on the 29th of May record an unusual purchase of large quantities of fertilizer out of Henderson, Nevada, with irregularities in the payment procedure by Mr. Gadahn (Northeast Florida Fusion Center, 2019). On June 17th 2019, the International Mail Facility in Miami, Florida, located pictures of the Hoover Dam sent from a town in the outskirts of Islamabad, Pakistan. These were addressed to Ms. Mary Lou, the identified sister-in-law to Mr. Noor Aziz Uddin. The target group was identified when they entered the lobby of a casino in Las Vegas, Nevada at around 1600hrs on August 25th. The three men have never been spotted together before and this was their first sighting as a group (CFIX & Exchange, 2019). Their suspicious behavior caught the attention of the bartender who, alongside security, made sure to keep close tabs on the trio and managed to collect some evidence during their stay and after their departure at 1740hrs on the same day. Tennessee Valley Authority reported a solo white male to be taking photos for an extended length of time on September the 30th. On December 4th, a video feed was intercepted which featured Sun Kailiang that speaks of brothers of all color uniting for a cause and a great day for the world that is soon dawning. References to the season of giving for the Christians was also referenced in the call. LAPD made contact with Mr. Gadahn where they issued him a ticket for running a red light. He was driving a 1999 international 3 ton white truck with a dent on the front quarter panel (USNorthcomm Force Protection, 2019). According to the Intelligence reports gathered, the following executive summary is made:
  • 5. There is a possible attack planned on the Hoover Dam in Florida. This is inferred from the repetitive mention of the term “dam” in their first meeting at the Casino lobby. It is further corroborated by the images sent by Noor to his sister-in-law in Phoenix, Arizona, and the reports of the lone white man taking photos over an extended period of time. The attack could possibly be a bomb attack on the dam with the intent to cause damage to the lives and property in the surrounding areas. This is supported by the large quantities of fertilizer acquired by Gadahn as well as the barrels that Gadahn was in possession of in the truck he was stopped in by the LAPD as fertilizer is a requisite in the making of a number of “home-made”/ self-made explosives. The attack is expected during the period of the Christmas holidays. This is supported by the intercepted video feed where Mr. Sun Kailiang on December 4th. Owing to this, there is a need to put a high alert on the targets with a “SEVERE” threat level on the Security Advisory System. This is due to the potential threat level in terms of possible damage by the attack as well as the short time period left before the date of the possible attack being Christmas and the current date of this report’s conception being past the 4th of December. Surveillance and Reconnaissance Plan It is of utmost importance to keep the targets under a keen watchful eye to make sure their planned attack does not materialize. The SR plan must also be incognito so as to not provoke the targets into executing ulterior or alternate plans to compensate. The process must also be done legally to ensure the prosecution of offenders is not stalled by legal procedure on the legality of surveillance process (Types of Surveillance in Criminal Investigations, 2018). The proposed SR plan aims to combine two surveillance techniques; fixed surveillance and electronic monitoring. Fixed surveillance is essential for this as it is dependent on the close monitoring of the targets’ activities from a set position. This can be done via setting up surveillance in a vehicle around the target bases or in this case can even require the need to set up
  • 6. the surveillance in a neighboring house. Two-person surveillance is best for its allowance of officers to relieve each other of duty and keep watch over the targets in shifts. Electronic monitoring in this case will allow the officers to intercept communication between the targets. This has been employed once before in the interception on the Sun Kailiang video feed and resulted in the acquisition of very important information. This can very well keep the officers steps ahead of the targets and ensure the operation’s success in curbing the attack as useful information such as time of the attack can be founded. It may also provide evidence that can be used at prosecution. For this to be legal, a court order is required before it can be launched. 2 References CFIX, & Exchange, C. F. (2019). Intelligence Bulletin. Florida: Central Florida Intelligence Exchange. Northeast Florida Fusion Center. (2019). Suspicious Activity Reports (SARs). Florida: Northeast Florida Fusion Center. Types of Surveillance in Criminal Investigations. (2018, July 1). Retrieved from Chron: https://work.chron.com/types- surveillance-criminal-investigations-9434.html USNorthcomm Force Protection. (2019). USNorthcomm Force Protection Anti-terrorism Instruction. New Hampshire: USNorthcomm Force Protection. i