Distinguish the nature of the threat

Assignment Help Other Subject
Reference no: EM132246980

For this assignment, continue creating a consolidated summary of the Suspicious Activity Reports (SARs) provided, and cover what is known about the nature and imminence of the potential threat and how to protect critical information from falling into the hands of the adversary. Use Suspicious Activity Reports #1 through #15. Your essay should be in two parts, labeled "Threat Assessment" and "Information Security."

The SARs can be found in the Assignment Guidelines and Rubrics section of the course.

Specifically, the following critical elements must be included:

III. Threat Assessment In this section of the report, you should lay out what is known about the nature and imminence of the potential threat. You may wish to use the Threat Assessment Worksheet, found in the Assignment Guidelines and Rubrics section of the course, to record and analyze relevant information from Suspicious Activities Reports (SARs) in preparing your response. However, you should present the information from the worksheet in narrative form in your finished intelligence report.

A. Distinguish the nature of the threat, including specific potential target(s), the location of likely attack (if the target is an individual), and potential means of attack based on the summary information and analysis above. Draw out the elements that would be most important to the agency receiving the report in determining the threat and focusing their efforts.

B. Assess whether the adversary has the intent, opportunity, and capability to carry out a threatening behavior. Is the threat being actively pursued? Support your answer with information from the SARs.

C. Assess the vulnerabilities of the potential target(s) and law enforcement's ability to protect the target(s). Support your answer using information from the SARs and reasonable assumptions about potential vulnerabilities. For example, how tight is security for entry into a particular building? Could a target be threatened from a street location? Could law enforcement be impeded from quickly responding to a threat? Note that these questions are illustrative only, and the vulnerabilities that you identify should correspond to your analysis of the specific threat identified.

D. Using the analyses in Parts A-C above, assess the current level of risk using a scale from 0-10, with 0 being "no threat" and 10 being "great threat." How imminent is the threat? Is it going to happen now, next week, in the next year, never? What level of damage could the adversary inflict if they are successful in carrying out the threat? Justify your answer based on your analysis.

E. Recommend what countermeasures, if any, might be appropriate for addressing vulnerabilities and mitigating the potential threat that you identified above. Depending on your analysis, you may suggest multiple countermeasures, a single countermeasure, or no countermeasures. Be sure to support your answer using your threat assessment analysis and information from the SARs.

IV. Information Security In this section of the report, you should address how to prevent critical information from falling into the hands of the adversary (i.e., operations security). You may wish to use the Operations Security Worksheet, found in the Assignment Guidelines and Rubrics section of the course, to record and analyze relevant information from the Suspicious Activity Reports (SARs) in preparing your response. However, you should present the information from the worksheet in narrative form in your finished intelligence report.

A. Assess what critical information surrounding the potential target and law enforcement activities to mitigate the threat needs to be protected. In other words, what information do we not want the adversary to have and why? Justify your answer.

B. Assess the adversary's methods for collecting intelligence about their target and law enforcement activities. Are they making multiple visits to the target? Are they using informants within the community? Are they doing research on the internet? Monitoring police bands? Taking pictures? What other methods might they be using? Support your answer using information from the SARs and reasonable assumptions.

C. Assess potential weaknesses in information security that might give away critical details about the target or law enforcement activities. Support your answer using information from the SARs and reasonable assumptions.

D. Risk assessment. Using the analyses in Parts A-C above, assess the current level of risk from information security weaknesses as high, medium, or low. In other words, how high is the risk that the adversary will obtain the critical information, and what level of damage could the adversary inflict if the information is acquired? Support your answer using information from the SARs and reasonable assumptions.

E. Recommendations. Suggest what countermeasures, if any, might be appropriate for addressing the information security vulnerabilities that you identified above. Justify these suggestions in terms of monetary cost versus effectiveness. How can we prevent or subvert the adversary's methods for collecting intelligence? How do we keep the adversary from knowing that we are aware of the threat and acting to avert it? Depending on your analysis, you may recommend multiple countermeasures, a single countermeasure, or no countermeasures. Be sure to support your answer using your operations security analysis and information from the SARs.

Guidelines for Submission: Milestone Two must be three to six pages in length with 12-point Times New Roman font, double spacing, and one-inch margins. Separate different sections with headings so that the reader can easily understand your information.

Reference no: EM132246980

Questions Cloud

Draft a short paper summarizing your analysis : You have just been assigned as the Community Services Sergeant in your local Police Department.
The use of victim impact statements in a psi report : What factors might explain why probation officer's recommendations are so highly correlated with actual sentences imposed by judges.
How have historical theories on female offending failed : How have historical theories on female offending failed to understand the nature of female offending?
Analyze the requirements for search and arrest warrants : Find a recent news article on the Internet that concerns probable cause and criminal procedure.
Distinguish the nature of the threat : Distinguish the nature of the threat, including specific potential target(s), the location of likely attack (if the target is an individual).
Explain the purpose of the usa patriot act : Should our federal government be able to revoke the citizenship of any American who provides "material support" to terrorists?
Discuss the ways an effective critical thinker assesses : Decide whether you agree or disagree with the statement, "Any compromise between good and evil only hurts the good and helps the evil."
Describe the challenges the community can anticipate : Choose one theoretical framework and incorporate elements into your presentation describing how it applies to this scenario.
Describe four potential difference- state and federal level : How would this same presentation differ if you were a state representative? If you were a federal representative?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd