Create in your mind a fictional entity. You may use a college as an example or create your own. In your fictional entity, assume there exists no current policy on company emails or employee internet activity on company equipment.
You have a lot of flexibility here. I recommend you consider a small business with only several employees.
Your report shall be in the style of a Proposal. See the attached Week 6 Assignment AUS Proposal Instructions for details. Your paper should have several actions identified. Choose a range of 5-10 actions to cover. For each item, your paper should include at a minimum:
Policy identification
Policy details
Possible actions in the event of break.
Please refer to the attached document for further details.
Category: Homeland Security
• Create and post an analysis of the HSEM-related grant (Port Security Grant Pro
• Create and post an analysis of the HSEM-related grant (Port Security Grant Program, PSGP).
• Please refer to the attached document for further details.
Please use my final resume PDF to help with creating this assignment. This assig
Please use my final resume PDF to help with creating this assignment. This assignment was supposed to be done before my final resume draft.
You’ve already reviewed three internships/jobs in Module 2. Now, you will analyze one of them or find a new/recent one (job postings preferred). This work will help you tailor your resume and cover letter for specific job postings.
Copy the job posting into a document.
Highlight qualifications and expectations with different colors according to your personal judgment and knowledge about the market. Some job postings state minimum and preferred qualifications. However, some of them are not obvious. You should find them! You can use
“yellow” for the most important,
“green” for the secondary, and
“blue” for the less important qualifications.
Open Track Changes (or similar tool) in the software and add comments for each minimum and preferred qualification. In these comments, state how your related qualifications match or do not match the position’s requirements. If your skills do not match the requirements, think about how you can cover these requirements as soon as possible.
Think about what is most impressive about this job posting for you (e.g. best fit for your background/skillset, high salary, working place or remote opportunity, career development, the company goal, other motives, working hours, family-friendly, etc.). At the end of the word document, write your thoughts about the job. Do you believe this job is perfect for you? Why?
In the following scenario, you’ll find the story of John before and after his in
In the following scenario, you’ll find the story of John before and after his interview. After reading about John, follow the directions in the attached document and reply to the stated questions or add your own. Then upload the completed document.
Congratulations! You’ve been invited for an on-site or phone/virtual interview.
Congratulations! You’ve been invited for an on-site or phone/virtual interview. It’s a great milestone toward your goal. Now, it’s time to prepare for the interview. There are important steps to follow before, during, and after an interview. After reviewing the Interviews & Mistakes resources, respond to the following questions.
Do you think Pete Mockaitis’s recommendation is appropriate for the first impression in your field? Why or why not?
How can you avoid the three common interview mistakes?
What are the four key steps to researching a company before you go to an interview? Complete this research about your job posting and share the information you’ve found with your peers.
RESOURCES:
https://www.linkedin.com/learning/how-to-rock-an-interview/plan-your-first-impression-14055016
https://www.linkedin.com/learning/expert-tips-for-answering-common-interview-questions/how-to-dress-for-an-interview?autoAdvance=true&autoSkip=false&resume=false
https://www.linkedin.com/learning/expert-tips-for-answering-common-interview-questions/how-to-research-a-company-before-your-interview?autoAdvance=true&autoSkip=false&resume=false
https://www.dhs.gov/homeland-security-careers/how-apply
https://www.idealist.org/en/careers/guide-mastering-job-interview
Ensure your infographic displays and answers the following information. What ar
Ensure your infographic displays and answers the following information.
What are the key legal and policy actions (List at least “ten legal actions,” i.e., USA Patriot Act, FISA Act, 9-11 Commission Report, …)?
What are the explanations/definitions for each legal action?
For this part, explain what the law/policy is about and why it is still important or not important.
Are these acts/policies/regulations still responding to the “needs” of homeland security enterprises and the public today? Why or why not?
The assignment’s goal is to evaluate the legal materials related to homeland security. This infographic will provide a common understanding of key legal laws/policies/acts/regulations on homeland security
RESOURCES:
https://www.hsaj.org/articles/118
https://www.americanprogress.org/article/redefining-homeland-security-new-framework-dhs-meet-todays-challenges/
As summarized in the presentation and CHDS video, some problems have been identi
As summarized in the presentation and CHDS video, some problems have been identified in terrorism studies. Being aware of those issues and their root causes will provide you with fundamental information to understand different approaches in terrorism studies. In this activity, examine core resources (presentation and CHDS video), and if you’re highly interested in the topic, I also recommend skipping Hoffman’s Inside Terrorism. Then, think about the following questions and write a reflection paper.
What comes to your mind when you first heard the term terrorism? Is it true? What is or should be the definition of terrorism? Why does the definition matter?
Can each state create its own definitions for terrorism? What may be the risks of it?
What problems have been identified by some scholars with terrorism studies in resources?
How can more objective scientific research on terrorism be achieved?
resources:
https://www.belfercenter.org/publication/strategies-terrorism
https://www.csis.org/analysis/escalating-terrorism-problem-united-states
https://www.start.umd.edu/research-projects/global-terrorism-database-gtd
Develop a research paper to address domestic intelligence collection and analysi
Develop a research paper to address domestic intelligence collection and analysis of your selected terrorist group from your Red Cell Midterm Assignment. Building on the information that you started in your midterm, prepare a new research paper that addresses which intelligence collection disciplines and agencies are essential to effectively collect on and analyze information about the red cell threat you chose in 5-7 full pages of content (not counting title or reference pages).
2. Domestic Intelligence Collection and Analysis:
Specify the most effective intelligence collection and analysis methods against the terrorist organization likely to conduct an attack within the United States that you selected by clearing answering all 3 of the following:
A) What domestic intelligence collection efforts would be best utilized on the organization you selected? (Intelligence Collection disciplines discussed in week 5) Do not focus on overseas intelligence collection programs; this is an HLSS course and we are focused ONLY on collection within the U.S. homeland.
B) Which members of the IC would be the best collectors of intelligence on this particular organization within the country? (the intelligence and law enforcement agencies of the intelligence community we discussed in week 2) You may address agencies that collect overseas and within the homeland as the terrorism nexus overlaps both domains. You may also consider some of the field agencies of DHS (since DHS I&A is just an office and does not collect) as some of the operating components do collect like ICE, CBP, USCG, and the Secret Service (who does focus on terrorism financing). Again, this is a Homeland Security course, so focus on the agencies that can support the homeland (like the FBI), NOT primarily overseas intelligence collection of foreign targets. Clearly focus your paper only on domestic intelligence and law enforcement and remember the CIA does not collect intelligence on Americans domestically, they are a foreign intelligence agency (as are ALL of the military intelligence branches). See the readings from week 5 as well as this link to Executive Order 12333 (2008) https://fas.org/irp/offdocs/eo/eo-12333-2008.pdf. However, the NSA is very different as they can and do collect both foreign and domestic communications (when authorized by a court [like FISA] or under certain conditions by the Attorney General to support the FBI). See https://www.nsa.gov/about/faqs/sigint-faqs.shtml
C) What intelligence analysis strategies would be the most effective and why? (choose only from the analytical strategies discussed in the week 6 lesson and specifically the reading U.S. Army (2020). ATP 2-33.4 Intelligence Analysis. Remember that critical thinking (brainstorming) and situational logic DO NOT in themselves constitute an analytical approach — be specific and pick at least two specific strategies you think will help analyze what can be collected on a clandestine terrorist group attempting to attack the U.S. homeland. Select at least one Diagnostic Structured Analytic technique from ATP 2-33.4 Chapter 5 and at least one Advanced (Contrarian or Imaginative) structured analytic technique from ATP 2-33.4 Chapter 6.
Note: Only focus here in this progress paper on intelligence collection disciplines, the most appropriate IC agencies to play a role, and the most effective analytical techniques to employ in this scenario. As a paper for this HLSS course, these questions are to be answered as it relates to collecting and analyzing intelligence on the terrorist group plans and activities within the U.S. as they prepare to attack. Do not address how to stop this attack, that will be the topic of your recommendations in your final paper due in week 7. That final paper will address what law enforcement and security officials here in the homeland can do to detect, identify, and warn on and potentially stop the hypothetical attack. You should readdress your hypothetical attack from your midterm using only a paragraph or two (unless you were specifically told that you did not address the attack in sufficient detail in your midterm).Your paper must be at a minimum of 5-7 pages (the Title and Reference pages do not count towards the minimum limit).
Refer to the midterm assignment instructions for details on the technical and academic requirements as well as links to the various research and writing tools and an example paper for proper APA formatting.
Drawing upon resource material provided and that discovered while conducting you
Drawing upon resource material provided and that discovered while conducting your own research, address both of the following topics:
1 Examine the role of risk management within the homeland security enterprise and related resources. Additionally, select one of the critical infrastructure sectors and specify how activities related to risk management are currently being employed to effectively address identified areas of risk, those that include (but not limited to) resource/grant allocation, strategic and other forms of planning, etc., from the federal level to state and local efforts.
2 Address how cyber-security relates to our nation’s critical infrastructure, as well as challenges related to providing such security within the homeland security enterprise.
Technical Requirements
• Your paper must be at a minimum of 4-6 pages (the Title and Reference pages do not count towards the minimum limit).
• Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
• Type in Times New Roman, 12 point and double space with 1 inch margins all around.
• Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. For more on this see the APA style guide https://apastyle.apa.org/style-grammar-guidelines/ (https://apastyle.apa.org/style-grammar-guidelines/). Also, use the attached APA style paper in Microsoft Word as a template for proper formatting.
• Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
• All submissions will be graded using the assignment rubric
Look at a high profile case that involved local law enforcement and the intellig
Look at a high profile case that involved local law enforcement and the intelligence community. Some choices you might want to look at include the Boston Marathon Bombing in April 2013, the Ft. Hood shootings in November 2009, the September 11, 2001, attacks on New York and Washington, the foiled Najibullah Zazi’s plot to bomb the New York subways (No information seems to have been shared with local LE), or another case of your choosing. Indicate which case you are looking at, and provide a link to the story if needed.
Summarize the important points of the case, including when the IC seemed to have information that could have been shared, and which agency had the information.
Identify 3 reasons that the IC failed to share information. Indicate whether each is an admission of the IC, a charge made by the LE community (or another non-LE part of government), or a justified opinion on your part.
From the perspective of the LE community, rebut the 3 reasons, and summarize how local LE could have re-positioned its efforts to stop the attack.
Evaluate whether repositioning LE assets as a result of information sharing would have impacted the final outcome, and whether it would have been better to share information.
Properly cite your quotations that you use to support your statements.