What were your greatest challenges in finding information on nonstate actor assaults?

M4_A1

Know the Enemy: Nonstate Actors
In M3 Assignment 1, you conducted research on intelligence threats to the U.S., with a focus on state actors. In this assignment, you will research nonstate actors. Nonstate actors are groups with motivations not tied to a government. Their loyalties may be motivated by group ties or affiliations (such as in the case of Hamas and al-Qaeda), personal feelings of revenge, or other nonstate-related reasons.
In this assignment, you will take the time to examine nonstate actors and their methods. Through this assignment, you will gain an awareness of the motivations and methods of nongovernment-sponsored actors to collect information against the U.S.
Tasks:
Using at least two scholarly resources from the professional literature, research some of the major intelligence threats to the U.S., focusing on nonstate actors. The literature may include the University online library resources; relevant textbooks; peer-reviewed journal articles; and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
You will probably find that there is less research material available on nonstate actors.
In a minimum of 300 words, respond to the following:

  • What are some of the major intelligence threats to the U.S. and their means to ascertain their goals? Focus on nonstate actors.
  • Who are nonstate actors? Briefly describe them and give examples.
  • What are their general methods of operations? Explain with examples.
  • Assaults by which of the nonstate-sponsored (nonstate actor) foreign intelligence services (FISs) on the United States Intelligence Community (USIC) appear to have caused the greatest damage, either through the loss of resources, failed missions, or the loss of lives?
  • What were your greatest challenges in finding information on nonstate actor assaults?

Give reasons in support of your responses.
Submission Details:

Describe the similarities and differences in information-gathering techniques used by US law enforcement and intelligence agencies to monitor threats from domestic and international terrorists.

Intelligence and Counterintelligence
Both domestic and international terrorism pose great threats to US citizens, the US economy, and domestic and foreign diplomatic relationships. Counterintelligence (CI) efforts aimed at detecting the activities of both domestic and international terrorists have risen in the years since the September 11 attacks. An entirely new agency, the Department of Homeland Security (DHS), was created to prevent the proliferation of terrorist groups and decrease the threat of terrorism.
Even though domestic and international terrorists might have different motivations for committing crimes of terror, threats from both types are considered equally dangerous and have to be continuously monitored to safeguard US citizens and interests.
The intelligence and CI activities utilized by various US government agencies, such as the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), the Drug Enforcement Administration (DEA), and the DHS, can be similar or different, depending on factors such as the seriousness of terrorist threats, the specific terror group being monitored, and the immediacy of threats.
Tasks:
Create a 3- to 4-page paper addressing the following:

  • Describe the similarities and differences in information-gathering techniques used by US law enforcement and intelligence agencies to monitor threats from domestic and international terrorists.
  • Research and describe differences in policies and regulations that oversee domestic and international intelligence gathering.

The paper should rely upon at least two scholarly resources from the professional literature. The literature may include the University online library resources; relevant textbooks; peer-reviewed journal articles; and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
Submission Details

How vulnerable is the US government to a potential cyber attack?

M5_A2

READ EVERYTHING! Check Grading rubric
RA 2: Contemporary Issues and Methods: Anonymous
In today’s world, technology must be considered when examining the psychology of espionage. Additionally, societal response is a key in understanding the impact of these acts. In this assignment, you will have the opportunity to analyze the relationship between cyber activity compromising national security information and the social media response.
The government organization for which you work has taken notice of the actions of a group named “Anonymous” against the Church of Scientology, among others. In order to better prepare, your organization wants you to analyze, from a forensic psychological perspective, a potentially significant compromise of national security information via a cyber attack. You have been instructed to use the attack on Scientology, the HBGary attack, or other significant cyber attacks credited to Anonymous as your basis of comparison.
Tasks:
Using the Argosy University online library resources and other reputable, valid sources, research the group Anonymous and its cyber-hacking activities, paying particular attention to the actions against the group’s methods. Use your interrogatories (who, what, where, when, how, and why) to guide your research.
Write a 10- to 12-page report that analyzes the impact this group has (or may have) on the U.S. (societal impact, including economic and infrastructure), corporate America (business impact), and the government (political impact).
In your report, address the following:

  • Provide a synopsis of the group’s methods, goals, and activities. Make sure you address its actions against its target as well as its overall activities, goals, and methods. Also, include an explanation of the group’s members and its makeup (e.g., the demographics and characteristics of the group members).
  • Discuss motivations and possible explanations for the group’s behavior. Identify the psychological constructs and processes and explain the group’s actions. For example, describe what types of social psychological constructs reinforce its membership. Social psychology research on group dynamics will help in this explanation.
  • Analyze the impact of a potential attack on the US government. At minimum, address the following:
    • How vulnerable is the US government to a potential cyber attack?
    • What parts of the IC are most affected by a potential cyber attack on US systems? Why?
  • Analyze the impact of a potential attack on society. At minimum, address the following:
    • What role would the social media play in future incidents of espionage and counterintelligence (CI) activities?
    • What would be society’s response to the attack? Would society be supportive or nonsupportive? How would it be divided? Justify your answers.
    • What would be the real and intangible consequences of Anonymous’s hacking activities? What would be the positive and negative impacts of its actions on society? Overall, would society benefit from or be hurt by such actions? Justify your answers.
  • Summarize key points and provide a conclusion, based on your analysis, of what can be done in the IC to avoid future compromises.

Note: Make sure you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation. Include citations in the text and at the end of the document in correct APA format.
RA 2 is worth 300 points and will be graded according to the following rubric:

Compare and contrast Karl Marx's and Max Weber's theories of social class

Choose three of the five questions below. For each question chosen, write an essay response of 250-300 words. In your response, be sure to refer to specific concepts from the readings, lecture notes, and/or discussions, and use these concepts to support your points. Please state the question prior to your answer.

    1. Choose a social problem, and explain how the sociological imagination, as defined by C. Wright Mills, can be used to understand the causes and consequences of that problem. Be sure that you address and apply the components of the sociological imagination in your response.
    1. Explain what is meant by the terms “ascribed status” and “achieved status.” Discuss a specific example that illustrates how a person’s ascribed status could influence his or her achieved status.
    1. Compare and contrast Karl Marx’s and Max Weber’s theories of social class. Explain which theory you think is more accurate and why.
    1. What are the key components of culture? Discuss at least three components of culture, giving specific examples of each component.
  1. Why is socialization so important to the development of our self-concept? Explain the role of socialization in shaping our lives, using at least three concepts from the course material in your explanation.