Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

You are a counter intelligence officer for the Defense Intelligence Agency (DIA) assigned to the Critical Technology Protection Division. Your division is responsible for providing counterintelligence support to research, development, and acquisition (RDA) missions. To accomplish this mission, your team has been asked to provide a counterintelligence threat briefing to a major defense contractor responsible for the research and development of critical U.S. defense technology. The purpose of this report is to help prevent foreign threats from acquiring U.S. critical program information to exploit and degrade its combat effectiveness and technical superiority.

Group Portion (1)

For this assignment, using the Small Group Discussion Board, you must review and discuss counterintelligence collection as well as the current list of U.S. critical technologies with your group.

  • As a group, do the following: 
    • Discuss counterintelligence collection methods.
      • Consider sources, techniques, and common operating pictures.
    • Examine the list of U.S. critical technologies.
      • A current list of critical technologies can be found within your Phase 3 Web resource titled Military Critical Technologies List.
    • Come to a group consensus, and select 1 technology from the list that will be examined in this assignment from a counterintelligence perspective.

Individual Portion

Once your group has chosen a piece of critical technology, each member of the group must prepare a counterintelligence threat assessment of 1,000-1,200 words about the group's selected technology.

  • Using the information from the course materials, the textbook, outside research, and the small group discussion, provide a threat assessment introduction on counterintelligence collection.
    • What methods and techniques are used in counterintelligence collection? Explain.
    • What are common sources for counterintelligence? Explain.
  • Using the information from the course materials, the textbook, outside research, and the small group discussion, draft the body of your counterintelligence threat assessment about the selected technology. The assessment should include the following sections:
    • A description and brief summary of the technology
    • Applications for which the technology is used
    • Which organizations use this piece of technology
    • Who develops or manufactures this technology
    • Which foreign adversaries are potentially interested in this technology
    • Methods this adversary may use to acquire this technology
    • Implications if this technology were to be compromised
    • Possible vulnerabilities for protecting this technology
    • Recommendations to safeguard this technology
  • Compile your responses in your final individual threat assessment, and submit the file.

Group Portion (2)

For the second group portion of this assignment, you must discuss, as a group, your findings from your threat assessment and develop a final collective counterintelligence threat briefing for the critical technology your group has chosen.

  • Evaluate the individual threat assessments of your group members.
  • Confer with your group, and select the strongest elements of the individual assessments.
    • There must be at least 1 section used from each group member.
  • Determine, as a group, how the final document will be formatted, organized, and compiled.
  • Complete the final collective threat assessment according to the agreed-upon guidelines, and submit the file to your instructor.
  • Be sure to reference all sources using APA style.
  • Be sure to include in text quotation.

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M91950709
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Business Management

Compare and contrast the five file system options available

Compare and contrast the five file system options available in Windows Server 2012 R2, and discuss when you think it is appropriate to use each one.

Name some marketing techniques and styles that you have

Name some marketing techniques and styles that you have encountered that demonstrate many of the strongpoints we learned in this course.

Examples of national quality control models whats are the

Examples of national quality control models? Whats are the key concepts?

1 select a product category and identify examples of

1. Select a product category and identify examples of product forms, brands and models. Describe some of the attributes, positive benefits and negative risks, and value meanings for each of these levels. Classify the val ...

Explain the self-determination theory regarding leadership

Explain the self-determination theory regarding leadership and organizational behavior.

How do demographic and economic factors influence ones

How do demographic and economic factors influence one's exposure to natural and technological hazards within a community or region?

Consider two computer companies - orange and ph - that

Consider two computer companies - Orange and PH - that report current sales receipts of $323 million and $294 million, respectively. Their cur-rent operating expenses were $150 million each. Orange issued $5 million in n ...

What kind of challenges and opportunities is four seasons

What kind of challenges and opportunities is Four Seasons Hotels facing in terms of processes and lateral capabilities? Please provide references for your answers.

A procedure in which federal inspectors are sent copies of

A procedure in which federal inspectors are sent copies of a buyer's specifications. A requirement is then made in the purchase agreement that the seller must submit the goods to this inspector for quality and quantity v ...

What evidence suggests that cotton plantations in the us

What evidence suggests that cotton plantations in the US South before the Civil War had economies of scale?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As