The us intelligence community

Assignment Help Other Subject
Reference no: EM131644064 , Length: 6

Written Threat Assessment: You are to assume the role of a US federal agency intelligence analyst who is putting together the agency's input (on your specific topic) for the DNI's Annual Threat Assessment, which will be presented to Congress.

Therefore, your goal is to produce an "all-source, fused" intelligence assessment. I realize that the bulk of your sources will be OSINT, but you are required to use at least one additional intelligence source (i.e. HUMINT, IMINT, SIGINT and/or MASINT from unclassified sources).

Are there commercial satellite images available regarding your topic? Can you find transcripts of telephone calls or other conversations? When it comes to OSINT sources, I want you to be creative as well.

Remember, as an intelligence analyst, you do not want to be guilty of "mirror imaging" so ensure that you take other leader's, State's and organization's motivations and goals into consideration. You are only limited by your imagination.

Also, remember your audience! Policymakers e.g., Congress or Cabinet members and President do not want an academic report. Do NOT include a great deal of background. A paragraph or two at most is sufficient for this policymaker audience. Write to inform and assume a certain amount of basic knowledge on the topic.

The following are recommended steps in developing your analytical threat assessment:

First step: Pick a topic that you believe would be of interest to the US intelligence community and is relevant to national security or US interests abroad.

Second step: Narrow your topic with respect to the actors, geographical locations or other pertinent, key issues.

Third step: Conduct some initial research on this topic to see if there is sufficient open source information available. Also, your initial research may provide insights into search terms and potential, relevant sources of information.

Fourth step: Develop a key intelligence question (KIQ).

Fifth step: Develop an outline - This is important! Please do not skip this step. I am glad to review your outlines with you.

Sixth step: Identify relevant, timely evidence to be used in your analysis.

Seventh step: Begin conducting your analysis.

Eighth step: Draft your paper. Revise, revise, revise.

Tenth step: Finalize your threat assessment based on your research.

You will need to properly document your sources. You may use APA's Parenthetical Citation Method or another citation style and you must have a Bibliography on a separate page at the end. This means that for any information that is not your own original ideas/work, you will need to cite the source and page number in parentheses at the end of the relevant sentences. You will also need to have a bibliography at the end with at least five different sources (including the two required above).

Let me know if you need guidance. Hope you enjoy this assignment. It is the kind of challenging and important tasks that intelligence analysts perform where their contribution can make a real difference.

It consists of a 5-6 page written (Times New Roman, 12 pt font, 1 inch margins, double-spaced) threat assessment on your intelligence topic of interest.

Reference no: EM131644064

Questions Cloud

Review of a scholarly article addressing ethic : Write a 2-3 page review of a scholarly article addressing Ethics and Why it Matters in Negotiation. Reviews should include a synopsis and your opinion
Compute consumer and producer surplus at market equilibrium : What is the market equilibrium? Compute the consumer and producer surplus at the market equilibrium. What is the total surplus?
Define hospital admission the develop acute renal failure : A patient is admitted to the intensive care unit after motor vehicle accident on the second of hospital admission the develop acute renal failure
Porters value chain and five forces models and a swot : This case study uses Porter's Value Chain and Five Forces models and a SWOT - Make sure you have in-text citations and a reference page.
The us intelligence community : Pick a topic that you believe would be of interest to the US intelligence community and is relevant to national security or US interests abroad.
Describe the precautions and personal protective : Describe the precautions and personal protective equipment required to care for this patient
How would you respond to claims by critics : What are the three most important lessons that the international community should have learned about economic sanctions from the Kimberley Process experience?
Identify a product that is crucial to our economic system : Identify a product that is crucial to our economic system. Explain the supply and demand curve for that product. What is the Law of Diminishing Demand?
What are sunnydale cares various sources of medical funds : What are Sunnydale Care's various sources of medical funds? What are the various implications for Sunnydale Care among each source of medical fund?

Reviews

Write a Review

Other Subject Questions & Answers

  Opioid antagonists-methadone maintenance

Describe the major limitations and concerns associated with each of the following therapies used to treat opioid dependence: opioid antagonists, methadone maintenance, buprenorphine, and rapid opioid detoxification.

  What is the ultimate check on an elected official in texas

What is the ultimate check on an elected official in Texas?

  What steps should researcher take to eliminate experimental

what steps should researcher take to eliminate experimental bias based on both experimenter expectations also participant expectations.

  Considered as a subtle form of conformity

Joseph is an eight year old child. Which of the following behaviors of him is considered as a subtle form of conformity?

  Explain patient-centered care and its importance

Explain patient-centered care and its importance in healthcare delivery

  Discuss early warning signs and assessment methods

Discuss early warning signs, and assessment methods that can be used to manage disorder. Is it possible to treat disorder before criminal tendencies develop?

  What are the six main officer vulnerability issues

What are the six main officer vulnerability issues when dealing with homeland security/confronting terrorists. Why are these issues a problem in terms of safety

  Identify and discuss ethical responsibilities of advertiser

Identify and discuss the ethical responsibilities of an advertiser, including the legal and regulatory perspective. Assess what the industry has done to meet those responsibilities, giving a specific example.

  Explain a mass inoculation program in your community

What public health data would have been used to determine the need for such a program, Where would you locate public health data

  Identify what information would be important to collect

Review the case study for "Zell Kravinsky" - Identify what information would be important to collect during the initial assessment process to make a diagnosis and why

  Issues such as occupational safety

In preparation for the Formal Report, you will choose a topic that is associated with your field of study. The topic should identify a problem and propose three potential solutions. The topic should be specific and career based. Consider issues su..

  Explain the new and old problems of induction

Explain the new and old problems of induction. what possible solutions are there to these problems?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd