SlideShare a Scribd company logo
1 of 6
Individual Project #1
You are an intelligence analyst for the Federal Bureau of
Investigation (FBI) assigned to the Counterintelligence (CI)
Division. The FBI’s CI Division has been involved in the field
of CI for decades. During this period, the CI division has
conducted thousands of CI investigations, many of which have
had a major impact on the history and national security of the
United States. It is important as an intelligence analyst with the
CI Division to have a clear understanding of these cases and to
learn from both its past CI successes and failures.
You have been asked by your supervisor to research major
espionage cases to produce an intelligence assessment from a
historical perspective that will help to recognize anomalies that
might indicate the presence of espionage and assist in the
neutralization process in the future.
Assignment Guidelines
For this assignment, you must write a counterintelligence case
study, approximately 750–1,000 words in length, on one of the
following major espionage cases:
Robert P. Hanssen
Aldrich H. Ames
Ana B. Montes
John A. Walker
For your selected case study, you will address the following in
detail:
Who
What was this person's personal background?
What was this person's professional background?
Were there any accomplices? If so, explain.
Which foreign powers were involved?
When
When did the espionage begin?
For how long did the espionage continue?
When was the spy apprehended?
Where
Where did the espionage take place?
Consider military intelligence, U.S. soil, agency/rank, and so
on.
What
What information was being leaked?
For what purposes could that information have been used?
How
How was the information taken from U.S. facilities or
databases? Explain in detail.
How was the information delivered to the foreign power or
powers? Explain.
How was the spy apprehended? Explain.
Why
What was the motivation for the espionage? Explain.
Answer the following questions as well:
What lessons were learned after the selected case concluded?
What impact did this particular case have on U.S. policies and
operational standards?
Consider successful and unsuccessful investigative techniques,
implications, and recommendations.
Compile your responses in your final case study, and submit the
file to your instructor.
All sources must be referenced using APA style.
Individual Project #2
You are an intelligence analyst for the Federal Bureau of
Investigation (FBI) assigned to the Counterintelligence (CI)
Division. You have been embedded on the Kartesia Country
Team and are responsible for producing a counterintelligence
assessment to forecast the potential counterintelligence threat
posed by Kartesia.
For many years, Kartesia and the United States have been
political and economic adversaries. Kartesia, which is led by an
oppressive dictatorship, has long feared that the United States
will initiate military action against it to topple the regime and
institute a democratic form of government. Although Kartesia's
ability to engage the United States in traditional warfare is
limited, it has a very well developed and sophisticated
intelligence apparatus that it deploys in the United States, as
well as against the U.S. presence within Kartesia in other third
world countries. The Kartesia Intelligence Services (KIS) also
heavily target antiregime elements in the United States, most of
which exist within several large Kartesian émigré communities
located throughout the country. Kartesia also has a long history
of supporting other groups and countries that are hostile to the
United States, including providing financial and logistical
support to terrorist groups.
The U.S. intelligence community (USIC) has designated
Kartesia a high-priority target, as is reflected in the National
Intelligence Priorities Framework (NIPF). FBI resources
dedicated to countering the intelligence activities of Kartesia in
the United States are also in a position to fill these broader
USIC requirements. One topic of particular concern to the USIC
is whether Kartesia has a program to develop weapons of mass
destruction (WMD), and if so, what its plans, capabilities, and
intentions are.
For this assignment, you must write a paper of 750–1,000 words
discussing how U.S. counterintelligence will be used to counter
the potential threat from Kartesia.
Assignment Guidelines
In a paper of 750–1,000 words, address the following:
What is the purpose of the National Intelligence Priorities
Framework (NIPF)? Explain.
How do counterintelligence professionals utilize the NIPF?
Explain.
How does the FBI Counterintelligence Division utilize the steps
of the intelligence cycle to validate threats and initiate
counterintelligence assessments? Explain.
Be sure to address each of the 6 phases of the intelligence cycle.
How will counterintelligence be used to counter the potential
threat from Kartesia? Explain.
Compile your responses in your final paper, and submit the file
to your instructor.
Be sure to reference all sources using APA style.
Individual Project #3
You are a counterintelligence officer for the Defense
Intelligence Agency (DIA) assigned to the Critical Technology
Protection Division. Your division is responsible for providing
counterintelligence support to research, development, and
acquisition (RDA) missions. To accomplish this mission, your
team has been asked to provide a counterintelligence threat
briefing to a major defense contractor responsible for the
research and development of critical U.S. defense technology.
The purpose of this report is to help prevent foreign threats
from acquiring U.S. critical program information to exploit and
degrade its combat effectiveness and technical superiority.
Group Portion (1)
For this assignment, using the Small Group Discussion Board,
you must review and discuss counterintelligence collection as
well as the current list of U.S. critical technologies with your
group.
As a group, do the following:
Discuss counterintelligence collection methods.
Consider sources, techniques, and common operating pictures.
Examine the list of U.S. critical technologies.
A current list of critical technologies can be found within your
Phase 3 Web resource titled
Military Critical Technologies List
.
Come to a group consensus, and select 1 technology from the
list that will be examined in this assignment from a
counterintelligence perspective.
Individual Portion
Once your group has chosen a piece of critical technology, each
member of the group must prepare a counterintelligence threat
assessment of 800–1,000 words about the group's selected
technology.
Using the information from the course materials, the textbook,
outside research, and the small group discussion, provide a
threat assessment introduction on counterintelligence collection.
What methods and techniques are used in counterintelligence
collection? Explain.
What are common sources for counterintelligence? Explain.
Using the information from the course materials, the textbook,
outside research, and the small group discussion, draft the body
of your counterintelligence threat assessment about the selected
technology. The assessment should include the following
sections:
A description and brief summary of the technology
Applications for which the technology is used
Which organizations use this piece of technology
Who develops or manufactures this technology
Which foreign adversaries are potentially interested in this
technology
Methods this adversary may use to acquire this technology
Implications if this technology were to be compromised
Possible vulnerabilities for protecting this technology
Recommendations to safeguard this technology
Compile your responses in your final individual threat
assessment, and submit the file.
Group Portion (2)
For the second group portion of this assignment, you must
discuss, as a group, your findings from your threat assessment
and develop a final collective counterintelligence threat briefing
for the critical technology your group has chosen.
Evaluate the individual threat assessments of your group
members.
Confer with your group, and select the strongest elements of the
individual assessments.
There must be at least 1 section used from each group member.
Determine, as a group, how the final document will be
formatted, organized, and compiled.
Complete the final collective threat assessment according to the
agreed-upon guidelines, and submit the file to your instructor.
Be sure to reference all sources using APA style.
Individual Project #1You are an intelligence analyst for the Feder.docx

More Related Content

Similar to Individual Project #1You are an intelligence analyst for the Feder.docx

Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxhealdkathaleen
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referwildmandelorse
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedSusanaFurman449
 
Domestic Intelligence.docx
Domestic Intelligence.docxDomestic Intelligence.docx
Domestic Intelligence.docxwrite12
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
QUESTION 1 What types of intelligence analysis are performed by.docx
QUESTION 1 What types of intelligence analysis are performed by.docxQUESTION 1 What types of intelligence analysis are performed by.docx
QUESTION 1 What types of intelligence analysis are performed by.docxbkbk37
 
Second Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docxSecond Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docxwrite12
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Disaster Preparedness Questionnaire Design and Pretest
Disaster Preparedness Questionnaire Design and PretestDisaster Preparedness Questionnaire Design and Pretest
Disaster Preparedness Questionnaire Design and Pretestmmwood
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxcelenarouzie
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysisUnimasteressays
 

Similar to Individual Project #1You are an intelligence analyst for the Feder.docx (16)

Intel policy-relationship-roundtable
Intel policy-relationship-roundtableIntel policy-relationship-roundtable
Intel policy-relationship-roundtable
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
Domestic Intelligence.docx
Domestic Intelligence.docxDomestic Intelligence.docx
Domestic Intelligence.docx
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
Hunter Resume (OSINT)
Hunter Resume (OSINT)Hunter Resume (OSINT)
Hunter Resume (OSINT)
 
QUESTION 1 What types of intelligence analysis are performed by.docx
QUESTION 1 What types of intelligence analysis are performed by.docxQUESTION 1 What types of intelligence analysis are performed by.docx
QUESTION 1 What types of intelligence analysis are performed by.docx
 
Second Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docxSecond Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docx
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017
 
Disaster Preparedness Questionnaire Design and Pretest
Disaster Preparedness Questionnaire Design and PretestDisaster Preparedness Questionnaire Design and Pretest
Disaster Preparedness Questionnaire Design and Pretest
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docx
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysis
 

More from widdowsonerica

Information Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docxInformation Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docxwiddowsonerica
 
Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxwiddowsonerica
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxwiddowsonerica
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxwiddowsonerica
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxwiddowsonerica
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxwiddowsonerica
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxwiddowsonerica
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxwiddowsonerica
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxwiddowsonerica
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxwiddowsonerica
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxwiddowsonerica
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxwiddowsonerica
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxwiddowsonerica
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxwiddowsonerica
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxwiddowsonerica
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxwiddowsonerica
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxwiddowsonerica
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxwiddowsonerica
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxwiddowsonerica
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxwiddowsonerica
 

More from widdowsonerica (20)

Information Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docxInformation Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docx
 
Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docx
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docx
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docx
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docx
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docx
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docx
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docx
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docx
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docx
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docx
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docx
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docx
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docx
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docx
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docx
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Individual Project #1You are an intelligence analyst for the Feder.docx

  • 1. Individual Project #1 You are an intelligence analyst for the Federal Bureau of Investigation (FBI) assigned to the Counterintelligence (CI) Division. The FBI’s CI Division has been involved in the field of CI for decades. During this period, the CI division has conducted thousands of CI investigations, many of which have had a major impact on the history and national security of the United States. It is important as an intelligence analyst with the CI Division to have a clear understanding of these cases and to learn from both its past CI successes and failures. You have been asked by your supervisor to research major espionage cases to produce an intelligence assessment from a historical perspective that will help to recognize anomalies that might indicate the presence of espionage and assist in the neutralization process in the future. Assignment Guidelines For this assignment, you must write a counterintelligence case study, approximately 750–1,000 words in length, on one of the following major espionage cases: Robert P. Hanssen Aldrich H. Ames Ana B. Montes John A. Walker For your selected case study, you will address the following in detail: Who What was this person's personal background? What was this person's professional background? Were there any accomplices? If so, explain. Which foreign powers were involved? When When did the espionage begin? For how long did the espionage continue? When was the spy apprehended? Where
  • 2. Where did the espionage take place? Consider military intelligence, U.S. soil, agency/rank, and so on. What What information was being leaked? For what purposes could that information have been used? How How was the information taken from U.S. facilities or databases? Explain in detail. How was the information delivered to the foreign power or powers? Explain. How was the spy apprehended? Explain. Why What was the motivation for the espionage? Explain. Answer the following questions as well: What lessons were learned after the selected case concluded? What impact did this particular case have on U.S. policies and operational standards? Consider successful and unsuccessful investigative techniques, implications, and recommendations. Compile your responses in your final case study, and submit the file to your instructor. All sources must be referenced using APA style. Individual Project #2 You are an intelligence analyst for the Federal Bureau of Investigation (FBI) assigned to the Counterintelligence (CI) Division. You have been embedded on the Kartesia Country Team and are responsible for producing a counterintelligence assessment to forecast the potential counterintelligence threat posed by Kartesia. For many years, Kartesia and the United States have been political and economic adversaries. Kartesia, which is led by an oppressive dictatorship, has long feared that the United States will initiate military action against it to topple the regime and institute a democratic form of government. Although Kartesia's ability to engage the United States in traditional warfare is
  • 3. limited, it has a very well developed and sophisticated intelligence apparatus that it deploys in the United States, as well as against the U.S. presence within Kartesia in other third world countries. The Kartesia Intelligence Services (KIS) also heavily target antiregime elements in the United States, most of which exist within several large Kartesian émigré communities located throughout the country. Kartesia also has a long history of supporting other groups and countries that are hostile to the United States, including providing financial and logistical support to terrorist groups. The U.S. intelligence community (USIC) has designated Kartesia a high-priority target, as is reflected in the National Intelligence Priorities Framework (NIPF). FBI resources dedicated to countering the intelligence activities of Kartesia in the United States are also in a position to fill these broader USIC requirements. One topic of particular concern to the USIC is whether Kartesia has a program to develop weapons of mass destruction (WMD), and if so, what its plans, capabilities, and intentions are. For this assignment, you must write a paper of 750–1,000 words discussing how U.S. counterintelligence will be used to counter the potential threat from Kartesia. Assignment Guidelines In a paper of 750–1,000 words, address the following: What is the purpose of the National Intelligence Priorities Framework (NIPF)? Explain. How do counterintelligence professionals utilize the NIPF? Explain. How does the FBI Counterintelligence Division utilize the steps of the intelligence cycle to validate threats and initiate counterintelligence assessments? Explain. Be sure to address each of the 6 phases of the intelligence cycle. How will counterintelligence be used to counter the potential threat from Kartesia? Explain. Compile your responses in your final paper, and submit the file to your instructor.
  • 4. Be sure to reference all sources using APA style. Individual Project #3 You are a counterintelligence officer for the Defense Intelligence Agency (DIA) assigned to the Critical Technology Protection Division. Your division is responsible for providing counterintelligence support to research, development, and acquisition (RDA) missions. To accomplish this mission, your team has been asked to provide a counterintelligence threat briefing to a major defense contractor responsible for the research and development of critical U.S. defense technology. The purpose of this report is to help prevent foreign threats from acquiring U.S. critical program information to exploit and degrade its combat effectiveness and technical superiority. Group Portion (1) For this assignment, using the Small Group Discussion Board, you must review and discuss counterintelligence collection as well as the current list of U.S. critical technologies with your group. As a group, do the following: Discuss counterintelligence collection methods. Consider sources, techniques, and common operating pictures. Examine the list of U.S. critical technologies. A current list of critical technologies can be found within your Phase 3 Web resource titled Military Critical Technologies List . Come to a group consensus, and select 1 technology from the list that will be examined in this assignment from a counterintelligence perspective. Individual Portion Once your group has chosen a piece of critical technology, each member of the group must prepare a counterintelligence threat assessment of 800–1,000 words about the group's selected technology. Using the information from the course materials, the textbook, outside research, and the small group discussion, provide a
  • 5. threat assessment introduction on counterintelligence collection. What methods and techniques are used in counterintelligence collection? Explain. What are common sources for counterintelligence? Explain. Using the information from the course materials, the textbook, outside research, and the small group discussion, draft the body of your counterintelligence threat assessment about the selected technology. The assessment should include the following sections: A description and brief summary of the technology Applications for which the technology is used Which organizations use this piece of technology Who develops or manufactures this technology Which foreign adversaries are potentially interested in this technology Methods this adversary may use to acquire this technology Implications if this technology were to be compromised Possible vulnerabilities for protecting this technology Recommendations to safeguard this technology Compile your responses in your final individual threat assessment, and submit the file. Group Portion (2) For the second group portion of this assignment, you must discuss, as a group, your findings from your threat assessment and develop a final collective counterintelligence threat briefing for the critical technology your group has chosen. Evaluate the individual threat assessments of your group members. Confer with your group, and select the strongest elements of the individual assessments. There must be at least 1 section used from each group member. Determine, as a group, how the final document will be formatted, organized, and compiled. Complete the final collective threat assessment according to the agreed-upon guidelines, and submit the file to your instructor. Be sure to reference all sources using APA style.