Discuss counterintelligence collection methods


Assignment:

You are a counterintelligence officer for the Defense Intelligence Agency (DIA) assigned to the Critical Technology Protection Division. Your division is responsible for providing counterintelligence support to research, development, and acquisition (RDA) missions. To accomplish this mission, your team has been asked to provide a counterintelligence threat briefing to a major defense contractor responsible for the research and development of critical U.S. defense technology. The purpose of this report is to help prevent foreign threats from acquiring U.S. critical program information to exploit and degrade its combat effectiveness and technical superiority.

You must review and discuss counterintelligence collection as well as the current list of U.S. critical technologies with your group.

Do the following:

Discuss counterintelligence collection methods.

Consider sources, techniques, and common operating pictures.

Examine the list of U.S. critical technologies.

A current list of critical technologies can be found within your Phase 3 Web resource titled Military Critical Technologies List.

Come to a group consensus, and select 1 technology from the list that will be examined in this assignment from a counterintelligence perspective.

Individual Portion:

Once your group has chosen a piece of critical technology, each member of the group must prepare a counterintelligence threat assessment of 800 words about the group's selected technology.

Using the information from the course materials, the textbook, outside research, and the small group discussion, provide a threat assessment introduction on counterintelligence collection.

What methods and techniques are used in counterintelligence collection? Explain.

What are common sources for counterintelligence? Explain.

Using the information from the course materials, the textbook, outside research, and the small group discussion, draft the body of your counterintelligence threat assessment about the selected technology. The assessment should include the below sections:

A description and brief summary of the technology

Applications for which the technology is used

Which organizations use this piece of technology

Who develops or manufactures this technology

Which foreign adversaries are potentially interested in this technology

Methods this adversary may use to acquire this technology

Implications if this technology were to be compromised

Possible vulnerabilities for protecting this technology

Recommendations to safeguard this technology

Compile your responses in your final individual threat assessment.

Solution Preview :

Prepared by a verified Expert
Other Subject: Discuss counterintelligence collection methods
Reference No:- TGS01976238

Now Priced at $35 (50% Discount)

Recommended (96%)

Rated (4.8/5)