everything you need is provided below. Watch the movie 12 angry men and answer the questions that are in the picture below. The link you need to watch the movie is also pasted.
Movie link: https://flixhd.cc/watch-movie/watch-12-angry-men-full-12154.8578495
Category: Criminal Justice
Using a minimum of 3 current, scholarly sources published within the past 5-10 y
Using a minimum of 3 current, scholarly sources published within the past 5-10 years of the current date, respond to the following question using between 500-700 words, excluding the references. Remember to adhere to all APA rules of writing (7th Edition). DO NOT USE AI FOR THIS ESSAY!
Explain how the various types of “crime mapping” strategies can be used to identify vulnerable neighborhoods prone to crime in order to develop and implement crime prevention strategies.
THE CONCEPT THAT WAS PROPOSED WAS ACCEPTED BY THE PROFESSOR WITH SOME ADDITIONAL
THE CONCEPT THAT WAS PROPOSED WAS ACCEPTED BY THE PROFESSOR WITH SOME ADDITIONAL SUGGESTIONS (GRADED CONCEPT FILE ATTACHED). PLEASE REVIEW THE FILE. PLEASE LABEL EACH PARAGRAPH AS I WILL NEED TO ADD THE INFORMATION TO A WEBSITE. REMEMBER THE MAIN FOCUS OF THIS ASSIGNMENT IS THE DEFENSE OF THE UNTIED STATES AND/OR AMERICANS FROM HARMFUL FOREIGN EXTREMIST/TERRORIST INFLUENCE. THE CONCEPT IS THE MOST IMPORTANT PART OF THIS ASSIGNMENT.
Develop a concept and build a website to address the most pressing issue in relation with international terrorism or extremism. Use one of the free Internet blog services, such as WordPress, Wix, Weebly, etc. The site does not have to be extensive, a couple of pages will be sufficient. The main thing you have to keep in mind when working on this assignment is defense of the United States and/or Americans from harmful foreign extremist/terrorist influence. Please note that the CONCEPT of the website is the key in this assignment – this is what you are proposing this week. The concept is more important than actual site design and software skills. You have to explain the concept by answering the following questions: What is the purpose of this website? Who is the intended audience? How is the website supposed to achieve its intended goal? When thinking about the concept, start by asking yourself a question: what is the most pressing issue one can address in this medium? You may decide that there is something that international terrorists/ extremists do not want others to know. Perhaps, your website should deter someone from joining the ranks of international terrorists. Or use your skills or knowledge to expose fake news or violent propaganda.
Saint Leo Dishonesty Policy The most common forms of academic dishonesty are che
Saint Leo Dishonesty Policy
The most common forms of academic dishonesty are cheating on tests and plagiarism. The ease of access that the Internet provides has also made it easier for students to plagiarize other people’s works. At the same time, online services such as Turnitin and SafeAssign have made it easier to catch the students who plagiarize other people’s works.
Despite all the warnings and admonishments, some students will inevitably try to get away with it. Regrettably, sometimes they do, but sooner or later they get caught. These students risk getting an F on the assignment that they plagiarized and an F for the entire course. They can also be expelled from the university. For this discussion question, first read the section in the Syllabus regarding Academic Dishonesty. Then read the article titled, “Student Perceptions of Anti Plagiarism Programs” (Nuñez, 2011) in Doc Sharing.
In your analysis, consider the pros and cons of the Saint Leo policy whereby students are required to submit their written assignments to the Turnitin.com web site. Consider that some other universities do not require students to submit their works to Turnitin or a comparable plagiarism check web site. These other universities leave it up to the student to check their own work on an optional basis. The course instructors are also given the latitude whether to check the work for plagiarism or not.
Now consider another Saint Leo University procedure as it pertains to plagiarism. Unlike some other universities, Saint Leo does not afford its instructors the discretion to make determinations and take disciplinary actions against students who have been caught plagiarizing. Instead, the Saint Leo procedure is to have the professors forward all the information regarding the plagiarism incident to the Graduate Academic Standards Committee, which in turn makes the final determination as to how the student will be disciplined. By contrast, some other universities allow the individual professor to make the determination as to whether there has been plagiarism and the professors are given the authority to deal with the matter in any way they deem appropriate.
Explain the advantages and disadvantages of these two very different policies. Which one do you think is better and why?
Comprehensive research paper Must be formatted per APA 7th guidelines The paper
Comprehensive research paper
Must be formatted per APA 7th guidelines
The paper should include a cover page and NO MORE THAN 25 double-spaced pages of content, plus a reference page.
You should use the 20 references from your annotated Bibliography, I will provide this in the files.
This order is VERY important and worth a max of 100% points. Below, I have attac
This order is VERY important and worth a max of 100% points. Below, I have attached both the instructions/formatting details and the rubric (file) that will be used to determine the final score.
You will have to get creative with this as it SHOULD be an interview and it MUST be written as such. From me to whomever (use an alias) or somehow if possible, juxtapose with an interview via YouTube etc… these are ideas… as mentioned before you would have to get very creative.
Once you determine the “how” or approach to conquer, which may come easy, please share before you began working. All details are here so I will have no need to bother afterwards.
Instructions:
– “For this paper you will be asked to interview someone about their opinions of the causes of crime. You will design the interview questions and discuss their responses. You may ask them about their general opinions of criminal behavior or select a specific crime. You should include your response to their perceptions.”
– “This paper should be NO LONGER than five (5) pages excluding references. Must NOT be more than a 15% match on TURNITIN”
Formatting:
– “APA format, double-spaced, black ink, Times New Roman, 1-inch margins.”
Please, I ensure that this is one of your — best work and orders. I greatly appreciate it in advance and looking forward to the final product.
• Your goal is to write 3-4 paragraphs of 4-5 sentences each about the top three
• Your goal is to write 3-4 paragraphs of 4-5 sentences each about the top three points/issues you learned about during the previous week.
• You should put an emphasis in your journal on what was your top takeaway from the previous week’s topics.
Use below readings and other resources
• Joint Military Intelligence College – June 1999 Intelligence Essentials For Everyone Occasional Paper Number 6
• Week 6 Class Notes
Introduction If the IC lacks the necessary information to analyze to satisfy a consumer’s requirements, then it will determine how to collect more information to feed into the intelligence cycle to answer that consumer’s needs. An intelligence collection discipline or a set of them (depending on the challenges of collecting against a target) will be applied against the intelligence “gap” or “problem.” The collection disciplines or “ints” are grouped into five major types: o HUMINT (human intelligence) o IMINT/GEOINT (imagery or geographic intelligence) o SIGINT (signals intelligence) o OSINT (open source intelligence) o MASINT (measurements & signatures intelligence) To help you think about all the different means to collect intelligence, it might be good to divided intelligence collection into two main types; literal and non-literal (See Table 6-1.). Literal information is in the form that humans use for communications. No special exploitation is needed except for translation. Nonliteral is the opposite, as technical expertise is needed to process and exploit it. British author Michael Herman divides literal as “…access to human thought process…” and nonliteral as “…observations of measurements of things…”1 Literal Intelligence Nonliteral Intelligence OSINT IMINT/GEOINT HUMINT ELINT and FISINT COMINT Acoustic/Seismic CYBER Biometrics/ Biologics/Medical Foreign Material Exploitation (FME) Table 6.1: Types of Literal & Nonliteral Intelligence Collection Disciplines. Of note, all of these “ints” are spread across the electromagnetic spectrum including HUMINT (think of eyesight!) (See Figure 6.1.). 1 Clark, Robert, Intelligence Collection, Sage Press: 2014, Wash DC. 2 Figure 6.1 Collection Disciplines & the Electromagnetic Spectrum. Intelligence Collection Disciplines Definitions2 SIGINT Signals intelligence (SIGINT) is derived from signal intercepts comprising — however transmitted — either individually or in combination: all communications intelligence (COMINT), electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT). The National Security Agency is responsible for collecting, processing, and reporting SIGINT. The National SIGINT Committee within NSA advises the Director, NSA, and the DNI on SIGINT policy issues and manages the SIGINT requirements system. 2 Definitions are from the Office of the Director of National Intelligence Shorter Wavelengths / Higher Frequencies Longer Wavelengths / Lower Frequencies MASINT HUMINT GEOINT SIGINT HUMIN T RADAR Cosmic Rays Gamma Rays 3 IMINT/GEOINT Imagery Intelligence (IMINT) includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Imagery can be derived from visual photography, radar sensors, and electro optics. Geospatial Intelligence (GEOINT) is the analysis and visual representation of security related activities on the earth. It is produced through an integration of imagery, imagery intelligence, and geospatial information. NGA is the manager for all imagery intelligence activities, both classified and unclassified, within the government, including requirements, collection, processing, exploitation, dissemination, archiving, and retrieval. GEOINT has a legal definition thanks to Congress: The term “geospatial intelligence” means the exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth. Geospatial intelligence consists of imagery, imagery intelligence, and geospatial information. Source: US Code, Title 10, Section 467 (10 USC 467) MASINT Measurement and Signature Intelligence (MASINT) is technically derived intelligence data other than imagery and SIGINT. The data results in intelligence that locates, identifies, or describes distinctive characteristics of targets. It employs a broad group of disciplines including nuclear, optical, radio frequency, acoustics, seismic, and materials sciences. Examples of this might be the distinctive radar signatures of specific aircraft systems or the chemical composition of air and water samples. The Directorate for MASINT and Technical Collection, a component of the Defense Intelligence Agency, is the focus for all national and Department of Defense MASINT matters. An interesting component of MASINT is foreign material exploitation or FME. FME is the exploitation and study of actual equipment the enemy uses. So, that equipment needs to be acquired by means, sometimes covert, sometimes on the battlefield or through assistance of allies. Think about this historical example—during the early months of WWII, the Japanese Zero fighter plane was technically superior to anything the US forces possessed. That was true until a crashed Zero was found virtually intact in a bog in the Aleutian Islands and taken back to the mainland for study by aeronautical engineers and scientists. The result was the US Navy’s new Hellcat fighter plane, which was designed to be technically 4 superior to the Zero. Soon the Japanese lost control of the air due to its huge losses due to the Hellcat’s superior combat performance. Occasionally, MASINT is confused with FISINT (foreign instrumentation signals intelligence—a form of SIGINT). Here is a way to avoid that. FISINT gathers signals from an instrument intentionally placed on a platform to transmit various types of information for evaluation by engineers and scientists. MASINT gathers data that naturally come from a process, machine or some other phenomenon. For example, the North Koreans test a new ballistic missile—they will have placed instruments on the missile to provide data back to them for scientific analysis—interception of those signals by an adversary is FISINT. MASINT would be a piece of metal that makes up the missile, or the residue from the launch pad when the missile is initially launched.3 HUMINT Human intelligence (HUMINT) is derived from human sources. To the public, HUMINT remains synonymous with espionage and covert or clandestine activities; however, overt collectors, such as diplomats and military attaches, perform most of this collection. It is the oldest method for collecting information, and until the technical revolution of the mid to late twentieth century, it was the primary source of intelligence. Mainly the Central Intelligence Agency, the Department of State, the Department of Defense, and the FBI as well as numerous other federal, state and local law enforcement agencies use HUMINT. Collection includes clandestine or covert acquisition of photography, documents, and other material; overt collection by personnel in diplomatic and consular posts; debriefing of foreign nationals and US citizens who travel abroad; and official contacts with foreign governments. Law enforcement would call HUMINT-confidential informants, interviews, etc. To improve HUMINT throughout the IC in response to the recommendations made by the WMD Commission, the CIA, working closely with the ODNI, restablished the National Clandestine Service (NCS). The NCS serves as the national authority for coordination, de-confliction, and evaluation of clandestine HUMINT operations across the Intelligence Community, both abroad and inside the United States, consistent with existing laws, executive orders, and interagency agreements. 3 Lowenthal and Clark, editors, The 5 Disciplines of Intelligence Collection, Sage Press: 2016, Wash DC. 5 Other aspects of HUMINT include the Defense Attaché System and intelligence liaison. Defense Attaché System Dating back to the late 1800s, the US has posted military officers to various countries worldwide as part of diplomatic missions. These overt intelligence collectors have diplomatic protection and are composed of officers from the five US armed services as well as the US Coast Guard. Today, the US Defense Attaché System is administered by Defense HUMINT, part of the Defense Intelligence Agency. Intelligence Liaison Mostly functions to facilitate sharing of intelligence between allies, intelligence liaison officers supplement the Defense Attaché System. But unlike the attaches, liaison officers are usually embedded within the intelligence agencies of allied nations. Bilateral or multilateral agreements or treaties govern how the exchange of intelligence information will occur within each country’s respective foreign disclosure program.4 For example, the “Five Eyes” alliance (United Kingdom, Australia, Canada, New Zealand and the United States) allows for defense intelligence liaison officers aka DIALs to be placed within each other’s intelligence communities. In my work with Coast Guard and Navy Intelligence, and now the ODNI, I often worked with the liaison officers and other government officials from all of these countries. Foreign disclosure is a small but important component of intelligence liaison as well as diplomacy. To quote a former shipmate of mine when describing what he did as a foreign disclosure officer, “I make copies of classified material and give it to foreign nations.” Of course, he and I (It was my first job in the Naval Intelligence Reserve Program.) were conducting foreign disclosure in accordance with Navy and IC policies. See the optional reading folder for the ODNI’s IC directive and policy guidance on foreign disclosure. Check out this link for more info on foreign disclosure as well. Check out the policy documents on foreign disclosure on this week’s Blackboard webpage under the Optional Reading folder. OSINT Open-Source Intelligence (OSINT) is publicly available information appearing in print or electronic form including radio, television, newspapers, journals, the Internet, commercial databases, and videos, graphics, and drawings. While open source collection responsibilities are broadly distributed through the IC, the major collectors are the DNI’s Open Source Enterprise (OSE) and the National Air and Space Intelligence Center (NASIC). 4 Foreign disclosure is part of the production and dissemination phases of the intelligence cycle. 6 The US Congress has defined OSINT as: “Open-source intelligence (OSINT) is intelligence that is produced from publicly available information and is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.”5 Review the table below for a summary of the intelligence collection disciplines. Intel Collection Discipline Sub Discipline Examples/Types HUMINT Overt Defense Attaches Military personnel Govt. personnel Observers (military personnel/civilians) Covert/Clandestine Agents/Spies Confidential Informants/Witnesses Non-Official Cover Official Cover IMINT/GEOINT Active Radar, Laser Passive EO, Infrared, Multispectral, Video SIGINT ELINT Radar Signals COMINT Cell phone, Radio FISINT Missile Instrumentation OSINT World Wide Web, grey literature MASINT ACINT Sonar, Shotspotter RADINT Geiger Counter FME Foreign military equipment Table 6-3. Summary of Intelligence Collection Disciplines. 5 Department of Defense Strategy for Open-source Intelligence (Pub. L. 109–163, div. A, title IX, §931, Jan. 6, 2006, 119 Stat.3411) https://www.govinfo.gov/content/pkg/USCODE-2011-title50/html/USCODE-2011-title50-chap15-subchapI-sec403-5.htm 7 TCPED Process6 Each intelligence collection discipline, regardless of if it is a technical or non-technical “INT,” must go through its own tasking, collection, processing, exploitation, and dissemination process (TCPED) to produce intelligence to be integrated into the intelligence cycle. Think of TCPED as a sub cycle within the larger intelligence cycle. Let’s examine each of those TCPED steps in detail: • Tasking: sending a request for information to a HUMINT collector or technical collection asset/tool/system. • Collection: determining what information to acquire, and then acquiring it. • Processing: getting the information into a useful format, such as transcribing and translating a foreign language broadcast into English. • Exploitation: Validating and analyzing the acquired information and organizing into a usable product. • Dissemination: Sending the information to the requestor and sharing it with any other consumer who may need it. Let’s look at the processing and exploitation parts of TCPED with GEOINT as an example. GEOINT has three traditional levels of processing and exploitation, which are time driven. Thanks to the advances in information technology, both the quality and timeliness of the following GEOINT processing and exploitation phases have improved dramatically since the early 1970s:7 • First Phase Exploitation: When timeliness is the dominant factor, an imagery product is delivered to consumers within 24hrs of the imagery being taken, in many cases, even faster. In these cases, the imagery is highly perishable and is meeting Indications & Warning Intelligence needs. • Second Phase Exploitation: This imagery product typically is delivered days after the imagery is obtained. The extra time provides to prove a more organized and in-depth review, most likely an all-source analysis, of the target. • Third Phase Exploitation/Analysis: This is really a form of all-source analysis providing detailed and complete reports on targets. May take up to a week to complete. So, it appears the intelligence collection TCPED process is a mini-intelligence cycle within the larger cycle. It gives credence to the analysts, and ultimately the consumer, that the information provided them through the collection phase is reliable and attempts to meet their needs. 6 Lowenthal and Clark, editors, The 5 Disciplines of Intelligence Collection, Sage, 2016. 7 Lowenthal and Clark, editors, The 5 Disciplines of Intelligence Collection, Sage, 2016. 8 Evaluation of Intelligence Information Why should collected information be evaluated? Easy answer—the need for sound analysis. “Analysis refers to the process of transforming the bits & pieces of information that are collected in whatever fashion into something that is usable by policymakers and military commanders.” – Adam Shulsky, Silent Warfare: Understanding the World of Intelligence The concern here is that if you put “garbage into the system, then what you get out of the system is garbage.” Two of the classic examples of evaluating intelligence are the rubrics used to review HUMINT and IMINT. Let’s look at HUMINT evaluation first. Evaluation of HUMINT is done in three parts: • Source Credibility • Source Frequency (how often the source provides information) • Information Evaluation Of note, this HUMINT evaluation system is also used in OSINT, particularly that OSINT derived from the World Wide Web. Why? Because humans are behind the content on the Web. Source Credibility Reliable No doubt of authenticity, trustworthiness, or competency; has a history of complete reliability Usually Reliable Minor doubt about authenticity, trustworthiness, or competency; has a history of valid information most of the time. Fairly Reliable Doubt about authenticity, trustworthiness, or competency, but has provided valid information in the past. Not Usually Reliable Significant doubt about authenticity, trustworthiness, or competency, but has provided valid information in the past. 9 Unreliable Lacking in authenticity, trustworthiness, or competency; history of invalid information Cannot be Judged No basis exists for evaluating the reliability of the source Source Frequency Constant Provider Sources primary purpose is to provided information on the target or subject Frequent Provider Source often provides information on the target or similar subjects. Limited Provider Source occasionally provides information on the target, subject or similar subjects. New or Unknown Provider Sources First known time providing information on the target or subject. Information Evaluation Confirmed Confirmed by other reputable independent sources; logical in itself consistent with other information on the subject. Probably True Not confirmed; logical in itself; consistent with other information on the subject. Possibly True Not confirmed; reasonably logical in itself; agrees with some other information on the subject Doubtfully True Not confirmed; possible but not logical; no other information on the subject 10 Improbable Not confirmed; not logical in itself, contradicted by other information on the subject Cannot be Judged No basis exists for evaluating the validity of the information. Evaluating Imagery/GEOINT The National Imagery Interpretability Rating Scale (NIIRS) is a subjective scale used for rating the quality of imagery acquired from various types of imaging systems. The NIIRS defines different levels of image quality/interpretability based on the types of tasks an analyst can perform with images of a given NIIRS rating. The idea is that imagery analysts should be able to perform more demanding interpretation tasks as the quality of the imagery increases. The NIIRS consists of 10 levels, from 0 (worst quality) to 9 (best quality). Because different types of imagery support different types of interpretation tasks, individual NIIRS has been developed for four major imaging types: visible, radar, infrared, and multispectral. Check out the NIIRS scale online here. Collection Management This may be my second favorite part of the intelligence business—the process of assigning the right collection asset or assets to help solve an intelligence problem. Often a case of finding the “square block” to fit into the “square hole,” collection management is both an art and science. Many technical collection systems (SIGINT, IMINT, MASINT) have hard deployment parameters—if the target is not within them—then it is useless to deploy that collection asset. The art is focused on the use of HUMINT and OSINT as well as the melding of all the collection disciplines together in an attempt to collect data to satisfy the consumer’s need. The fun is determining what team or group of collection systems will produce sufficient intelligence to fuel adequate analysis. There are two major variables impacting that choice: the target’s location and material composition, and the priorities or availability of the collection systems. A good collection manager, with much assistance from the responsible analyst, must know as much about the target as possible to optimize the utilization of collection systems. Then the collection manager has to balance what systems could collect against the target versus what systems are actually available (priorities) within a reasonable timeframe that will allow the collected information to be useful. 11 Of note, most IC agencies will have a collection management team to engage the national collection systems, and also commercial space-based systems, for their respective agency’s needs and to manage any tactical or operational collections systems they may operate. The analyst and collection manager will use one or more systems to “tip-off” the use of another. For example, HUMINT reporting from Damascus, Syria indicates the Syrian Govt. is moving its elite troops only at night. Knowing this, the collection manager could task a space-based infrared system to confirm that HUMINT report. I often did this—in one case, I analyzed HUMINT, which led me to target an area with IMINT systems, which indicated the original HUMINT was incorrect. I then used that information to revise my HUMINT tasking for that target area. Okay, so let’s employ a very simple intelligence collection management rubric with a fictional case. • You are the lead analyst in DIA’s Defense Counter Terrorism Center Hezbollah team. • The Defense Attaché in Lebanon reported via HUMINT report regarding a new combat swimmer training facility in Sidon, Lebanon. Possibly for the Hezbollah. The HUMINT report is provided below: FOR TRAINING PURPOSES ONLY FROM: USDAO BEIRUT LE TO: DIA WASHINGTON DC//DCTC// SUBJ: IIR 2013-086 SUSPECT HEZBOLLAH COMBAT SWIMMER TRAINING FACILITY 1. This Intelligence Information Report is based upon unevaluated intelligence information from a HUMINT source. 2. Source: Reliable multi-time provider 3. DOI: 08/21/2013 4. Report: Lebanese government officials have provided information to the reporting officer indicating Hezbollah operatives, along with Iranian trainers from the Al Quds Force, have moved their combat swimmer training base from Bandar Abbas, Iran to the Lebanese port of Sidon in southwestern Lebanon. The source believes the move of the training facility may have been to increase Hezbollah capabilities against the Israeli Navy in the Mediterranean Sea. 12 The officials provided a location of the base to be two (2) miles north of the large quay handling the daily ferries from Cyprus. It appears other than normal private security measures that the base is hiding in plain sight. 5. Send any IIR Evals to USDAO Beirut. FOR TRAINING PURPOSES ONLY Figure 5-2. Map of Lebanon. Okay, now let’s take a look at our rubric: 1. Is the target mobile or stationary? (Aids in determining what IMINT system to task) 2. Does the target possess any communications systems or emitters to exploit? (Aids in determining what SIGINT system to task) 3. Are there HUMINT assets available for follow-up? 13 4. Is this a crisis situation (adhoc need) or a standing intelligence problem?8 (Helps in determining how long an analyst has to set up additional collection on the target) What are our first steps? The HUMINT report mentions two locations—one in Iran and one in Lebanon. Both sites could be imaged to confirm the original report and reveal more details about the site in Lebanon. Second step could be to send feedback to the collector via an IIR Evaluation9 , which will include additional questions for the collector to answer. Based upon info gathered from those efforts, you may have enough to bring in other systems (such as SIGINT) as needed. Some last thoughts regarding collection management: • Beware of relying on one or two collection disciplines. Be open to use as many as possible. • Don’t try to be an expert on all collection systems, but do develop a working knowledge so you can engage the collection managers in a thoughtful manner. • Develop a good relationship with the collection managers supporting your analytical effort. Bring them into your world as much as possible. In some cases, collection managers are embedded within analytic efforts in order to increase their background knowledge of the intelligence problem at hand. 8 Standing intelligence problems have been previously assigned and are part of the daily workload of an analyst or collection manager. 9 Call into the Thursday chat someday to hear about my adventures writing IIR evaluations See less
Article is uploaded along with how to critique the critiquing rubric Makes notes
Article is uploaded along with how to critique the critiquing rubric Makes notes positive and negitive and correct any grammar content error
What is the ethical dilemma faced by management in this case? Explain. What spec
What is the ethical dilemma faced by management in this case? Explain.
What specific problems might Newell face in its downsizing decision?
What options might Newell employ in its downsizing decision? Explain.
How would you downsize the workforce at the Norwood facility? Explain.
https://faulkner.instructure.com/login/ldap
After you sign in, go to COURSES on the left hand side and type in Managing Human Resources in Criminal Justice, then select MODULES, the scroll down to week 1 assignments, Integrative Cases: Newell’s Decision to Downsize – An Ethical Dilemma and read the cengage reading before answering questions.
Please respond to the questions in essay format!!!
For Syrian Scenario You are the senior collection manager at Joint Intelligenc
For Syrian Scenario
You are the senior collection manager at Joint Intelligence Center—CENTCOM in Tampa, Florida—the joint intelligence center for Central Command. You have just received the RFI (request for information) from CTF-61 (the work you did for Assignment #1), who is planning the amphibious assault operation to be conducted near the port city of Tartus, Syria.
CTF-61 is seeking intelligence to support operations to achieve the following operational goals:
• Secure an advanced base (airfields, port facilities, lines of communication, etc.) for follow-on NATO forces, which will be intervening in Syria to conduct combat operations against ISIS.
• Create a safe haven for displaced persons in Syria fleeing violence. Support non-govt agencies/orgs aiding the Syrian displaced persons.
• Gather intelligence on ISIS presence in your area of operations (all of the Syrian coastline plus 200 miles inland).
• Link up with non-ISIS rebel forces and assess their needs for training, equipment, and supplies.
• Engage Syrian govt forces—force their surrender or render them unable to conduct any combat operations.
You have about a week maybe, no more than two to find or collect as much information as possible to feed into the analytical process that will ultimately produce the new or updated intelligence required by CTF-61. Answer each of the following tasks:
• What national security collection disciplines and related systems would you focus on tasking? If so, why? Be sure to match your selections to the list of EEIs provided in the RFI.
• Would foreign liaison be of benefit in “casting a larger net” to collect the information needed to fill priority intelligence gaps? If so, why? What countries could potentially be partners for foreign liaison?