Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Progress Assignment (1)

Progress Assignment (1)

Q Assignment Instructions Building on the information that you prepared from your Midterm Assignment (but without repeating what you wrote), prepare a research paper that addresses the below information in 5-7 pages: For the terrorist organization likely to conduct an attack within the United States that you selected, determine: • What data collection programs would be best utilized on the organization you selected? (refer to the Intelligence Collection disciplines discussed in week 5) • Which members of the IC would be the best collectors of intelligence on this particular organization? • What intelligence analysis strategies would be the most effective and why? (choose from the analytical techniques discussed in the week 6 lesson) Note: As a paper for an HLSS course, these questions are to be answered as it relates to collecting and analyzing intelligence on the group’s plans and activities within the U.S. as they prepare to attack so that law enforcement and security officials can prevent or disrupt the attack (and you will address those countermeasures in your final paper). Clarification on assignments: The first paper (the midterm) was about the group you selected and was basically from a historical perspective about the group. The second paper (the progress assignment) is a red cell where you put yourself in the shoes of the terrorist group by thinking like they would to determine how the U.S. can do intelligence collection on the terrorist group. NOTE: This is still an academic paper, so you should not write in first person. For the final assignment, you will combine all that you wrote in the first two papers into one document (do not delete information or re-write the paper unless you are told to do so in the feedback you receive on prior assignments) and you will add at least three recommendations you would provide to a Homeland Security policy maker on how to counter your selected organization. Be sure to improve your writing based on feedback you receive from the midterm and progress assignment. Make sure you read the instructions carefully and that you focus your paper on answering the assigned question. This assignment is a research paper, not an opinion paper, so you need to use the class readings to support your thesis. Make sure you use APA style in-text parenthetical citations at the end of every sentence where you are quoting or paraphrasing another’s ideas (or any information) that is not your own thoughts and words, like this (Bergen, 2015, para 14). I highly recommend you use the APUS writing guide based on the APA style which can be found in the university library or at this link: APUS Style Guide for APA. You are welcome to use supplementary sources to compliment the assigned readings based upon your research, but make sure you use scholarly and credible sources. See the APUS Library Homeland Security Program Guide for good sources, as well as the APUS Research Primer and the APUS Library Research FAQs. For formatting, the best option is to use the attached example paper as a template (for formatting purposes only). Requirements: • Five-seven (5-7) pages of text, not including the Title or Reference pages • Written according to the APA style and format • Use Times New Roman 12 point font • 1 inch margins on all sides • Double space all text (no extra lines or spaces after a paragraph or section headings) A respectable number of credible resources used, cited in the paper as in-text citations, and included on the reference page. A good rule of thumb is at least 2-3 scholarly sources per page of content. This Progress Assignment is due Sunday of Week 6. The SSGS Assignment Rubric for 300-400 Level Classes will be used to evaluate this assignment (attached). Supporting Materials • SSGS APUS Assignment Rubric 300-400 Level.docx (21 KB)

View Related Questions

Solution Preview

A diverse group of effective data-collection techniques had been practiced and applied during the operations actualized by ISIS. Social media is one of those effective techniques because a lot of information had been tracked and collected illegally by the ISIS members. The information collected by ISIS members can be tracked via the utilization and application of Cyber Intelligence (CYBINT) as well as by the collection method of Open Source Intelligence (OSINT).