Insider Threats Analysis/Penetration Analysis

User Generated

Gjryirr43

Writing

Description

Insider Threats Analysis/Penetration AnalysisInsider Threat and Penetration of Hostile Intelligence Operations

View Full Description and Attachment(s)

In Week 6 you will have the option to address one of two topics. The first is insider threat analysis and the other is the threat presented by hostile intelligence operations. Also, you are required to respond to more than 3 other student postings. Don't forget to be challenging and show what you know. Challenge, reflect, add new information, new perspectives, etc.

Topic 1

Insider threats come from individuals who operate inside friendly intelligence and national security organizations who purposefully set out to cause disruption, destruction, and commit crimes to those ends. Please read Insider Threat IPT and Solving Insider Threat in the Course Materials Folder. Using the web or the online library choose a high profile case of insider threat (cyber, intelligence, military) and draft a 350 word summary of the case highlighting successes or failures of analysis in bringing resolution to the case. What analysis methods can you discern? What do think could have been done differently to improve the analysis?

--or--

Topic 2

Complete reading Foreign Espionage Threat andObservations on the Double Agent and Social Courtesy. In the penetration of a hostile intelligence service analysis is central to identifying, pursuing, and preparing the recruitment of an agent. In 350 words please research the Oleg Penkovsky, Aldritch Ames, or Jonathan Pollard cases. Provide a summary of the role of analysis in the recruitment and running of these agents from the perspective of their handlers (the US/British, Soviet Union, and Israel, respectively). You'll need to conduct additional research on the web or in the online library to help you develop a factual understanding of the case you choose.

Suggested Reading for the week (but not required):Predictive Intelligence in the Course Materials folder.

If you have any questions please ask!
Instructions: Your initial post should be at least 350 words for each question. Please respond to at least 3 other students. Responses should be a minimum of 250 words each. Ensure that you use the Chicago format to cite your sources.

Initial Post Due: Thursday, by 11:55pm ET
Responses Due: Sunday, by 11:55pm ET

Grading will be based on the following criteria:

50 - Initial Discussion Posting - Your original posting/response shows a clear understanding of the concepts presented by providing evidence from the assigned literature (with attribution). The initial posting is thought provoking and on topic. Timely posting of your original response to the Forum.

50 - Responses to Discussion Posts of Other Participants - You responded to more than 3 or more classmates by the due date and each advances the learning by including at least two of the following components: (1) Validates post with additional evidence from the literature (2) Poses a thoughtful question (3) Provides an alternative point-of-view (4) Offers additional insight into how the concept might be understood. Generally two-three full paragraphs per response. Your responses demonstrate careful analysis of your classmate’s opinions, and incorporate several terms, concepts, or theories from the required readings. Timely engagement with your classmates on the Forum. (See Forum Rubric)

CIIACPredictiveIntelligence.docx
Foreign Espionage Threat.pdf
SocialCourtesy.pdf
ObservationsontheDoubleAgent.pdf
SolvingInsiderThreat.pdf
InsiderThreatIPT.pdf

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

TOPIC 1 DISCUSSION FORUM

1

Hello, Everyone
I am hoping that you are all having a great week. This week we have been tasked to choose between two
topics to discuss. Personally, based on what I had learned last week and what I have been learning
throughout the five weeks, I am going to choose and work with Topic 1. The topic is all about choosing a
high profile case of insider threat relating to either military, intelligence, or cyber, then drafting a
summary of the case highlighting successes or failures of analysis in bringing resolution to the case. From
last week discussion forum, I did thorough research on some of the various high profile cases of insider
threats. I came across several cases online. However, the one that I would want to discuss today, based on
my previous and present research concerning the same is the Aldrich Ames Case. Aldrich Ames, at t...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags