Posts

Explain why, you believe, the shifts in data from 1990 have now occurred

PERSEREC Study Analysis
Defense Personnel and Security Research Center (PERSEREC) was established by the Department of Defense (DoD) to improve the effectiveness, efficiency, and fairness of the DoD personnel security system. PERSEREC is a component of the Defense Human Resources Activity (DHRA) under the Office of the Under Secretary of Defense (Personnel and Readiness). It employs researchers to conduct applied research to improve the DoD Personnel Security Program. One of those research programs maintains a database on espionage. Familiarizing yourself with this organization is essential in understanding how espionage is studied in the U.S.
Review the following article:

  • Herbig, K. L. (2008). Changes in espionage by Americans: 1947–2007          (Technical Report No. 08-05). Monterey, CA: US Department of          Defense, Defense Personnel Security Research Center. Retrieved          from http://www.dhra.mil/perserec/reports/tr08-05.pdf

Tasks:
In a minimum of 300 words, respond to the following:

  • Examine the information in the PERSEREC study and review the executive summary of the report in detail.
  • Explain why, you believe, the shifts in data from 1990 have now occurred. In other words, what is going on globally, psychologically, or culturally to explain these data shifts? Use examples of data shifts from the study.

Your responses should include at least two scholarly resources from the professional literature. The literature may include the University online library resources; relevant textbooks; peer-reviewed journal articles; and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
Submission Details:

Treatment Plan for Stabilization

Treatment Plan for Stabilization
An important part of the skills you will improve in developing appropriate interventions is designing a treatment plan focusing on stabilization that is appropriate to the particular client treated.
In this assignment, you will create a treatment plan for stabilization based on the information provided in the vignette.
Study the vignette.
Tasks:
You are the crisis intervention counselor at the hospital where Alice is hospitalized. After obtaining the information mentioned in the vignette, use this template to design a 3- to 4-page treatment plan, with a focus on the stabilization of the client. Your assignment should be comprised of two parts as described below:

  1. Your first part of the response should include how you will achieve the following:
    • The development of a therapeutic relationship, given the fact that Alice may not think she needs your services
    • The client’s physical and emotional wellbeing
    • The establishment or restoration of a normal routine for the client
  2. The second part of the response should include your treatment plan for the identified problem, behavioral description, long-term goals, short-term objectives, and therapeutic interventions.

Use the given template to complete both parts of your assignment.
All written assignments and responses should follow APA rules for attributing sources.
This assignment is worth 100 points and will be graded according to the following grading criteria.

Describe the cognitive processes, behavior, and emotional makeup of the spy, such as how he or she thinks, acts, or feels, using a major theoretical orientation on personality psychology

M3_A2

Please pay close attention to the grading rubric
RA 1: Spy Case from PERSEREC
You work as a mental health professional in an organization that is examining methods to avoid potential intelligence compromises. You have been asked to evaluate an existing spy case in order to achieve a greater working knowledge of the motivation of espionage in an effort to avoid future compromises in the organization.
In a formal report, conduct an evaluation and case conceptualization. Identify the risk factors, vulnerabilities, and threats; identify the potential mental disorders, symptoms, and prognoses; and explain how this type of indirect assessment relates to the ethics code as prescribed by APA.
Tasks:
Create an 8- to 10-page report responding to the following:

  • Select a spy case from the Defense Personnel and Security Research Center (PERSEREC) case page. You cannot select a case that has already been examined or discussed in this course.
  • Conduct a case study evaluation and case conceptualization of your selected spy case as described below.
    • For the case study evaluation:
      • Summarize the case facts. Include not only the case details as outlined by evidence and a description of the act but also the characteristics of the perpetrator, such as demography, socioeconomic status, work history, and relation with the intelligence community (IC) organization where the espionage occurred. Articulate what, where, when, how, and who of the act of espionage in the case you have chosen.
      • Identify the risk factors and vulnerabilities in the spy and the threats of the case. Risk factors and vulnerabilities are intrinsic to the perpetrator and include factors that made the perpetrator more susceptible to committing the act of espionage. Threats are extrinsic to the perpetrator and bring dangers to the asset. In these cases, the asset is national security information.
    • For the case conceptualization:
      • Describe the cognitive processes, behavior, and emotional makeup of the spy, such as how he or she thinks, acts, or feels, using a major theoretical orientation on personality psychology (such as cognitive behavioral and psychodynamic behavioral).
      • Identify any potential mental disorders or symptoms that may exist and include them in your prognosis.
      • Explain how this type of indirect assessment meets (or does not meet) the ethics code as prescribed by APA. This section should be supported by the existing body of psychology literature.

The report should rely upon at least five scholarly resources from the professional literature. The literature may include the University online library resources; relevant textbooks; peer-reviewed journal articles; and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
Submission Details
RA 1 is worth 200 points and will be graded according to the following rubric:

What were your greatest challenges in finding information on nonstate actor assaults?

M4_A1

Know the Enemy: Nonstate Actors
In M3 Assignment 1, you conducted research on intelligence threats to the U.S., with a focus on state actors. In this assignment, you will research nonstate actors. Nonstate actors are groups with motivations not tied to a government. Their loyalties may be motivated by group ties or affiliations (such as in the case of Hamas and al-Qaeda), personal feelings of revenge, or other nonstate-related reasons.
In this assignment, you will take the time to examine nonstate actors and their methods. Through this assignment, you will gain an awareness of the motivations and methods of nongovernment-sponsored actors to collect information against the U.S.
Tasks:
Using at least two scholarly resources from the professional literature, research some of the major intelligence threats to the U.S., focusing on nonstate actors. The literature may include the University online library resources; relevant textbooks; peer-reviewed journal articles; and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
You will probably find that there is less research material available on nonstate actors.
In a minimum of 300 words, respond to the following:

  • What are some of the major intelligence threats to the U.S. and their means to ascertain their goals? Focus on nonstate actors.
  • Who are nonstate actors? Briefly describe them and give examples.
  • What are their general methods of operations? Explain with examples.
  • Assaults by which of the nonstate-sponsored (nonstate actor) foreign intelligence services (FISs) on the United States Intelligence Community (USIC) appear to have caused the greatest damage, either through the loss of resources, failed missions, or the loss of lives?
  • What were your greatest challenges in finding information on nonstate actor assaults?

Give reasons in support of your responses.
Submission Details: