This assignment consists of a research-analysis paper approximately four pages in length, double-spaced (This page count does not include a title page, abstract (optional), table of contents (optional), Reference listing page(s), or end-notes page(s) (if used)). The source material should result primarily from self-led research of the required texts and readings from this course. The paper should have approximately four pages of content which are the written results of your research efforts.
Progress Assignment
Value: This Assignment counts for 25% of your final course grade.
Deadline: Sunday, 11:55 PM, ET, End of Week 6.
Objective: This assignment, in accordance with undergraduate academic endeavors, provides an opportunity to evaluate assimilation of course topics, and sharpen and evaluate students’ research & critical thinking skills.
Type: This assignment consists of a research-analysis paper approximately four pages in length, double-spaced (This page count does not include a title page, abstract (optional), table of contents (optional), Reference listing page(s), or end-notes page(s) (if used)). The source material should result primarily from self-led research of the required texts and readings from this course. The paper should have approximately four pages of content which are the written results of your research efforts.
Topic: Research and analyze a counter-terrorism or cyberspace operation which primarily utilized defensive counterintelligence support. Discuss the historical events that let to the mission, identify the agency and the opponent, and identify the defensive principles of deter and detect in the countermeasures. Some examples of relevant counterterrorism operations may include: 1983’s Marine Barracks in Lebanon, 1993 WTC bombing, 1996 USS Cole, 1998 US Embassies in Africa, Sept 11 2001, 2005 London bombings, etc. Some examples of relevant cyberspace operations may include: 2001-2005 Chinese cyberespionage (Titan Rain), 2011 Duqu worm(surveillance malware targeted at Iranian nuclear facilities), 2012 Flame (surveillance malware targeted at the Iranian oil industry), 2012-2013 cyberattacks against U.S. banking industry, etc.
Format: Your paper requires a Title page, citations, and a References list. Your paper should be in the Chicago style.
Please name your file: LastName_INTL410_Progress.docx (or .doc)
Once you have completed this assignment, please upload your paper for evaluation and instructor feedback.
Grading: Your research analysis essay will be graded using the following rubric.
Points: (See Full SSGS Assignment Rubric Guidance in the SSGS Assignment Rubric 300-400 Level document)
Criteria
Exemplary 16-20
Accomplished 11-15
Developing 6-10
Beginning 0-5
Total
Demonstrates Knowledge of CI Types, Functions and Principles
/20
Analysis/Critical Thinking
/20
Evidence and Support
/20
Organization
/20
Writing Mechanics and Citations
/20
Total
/100
After you have uploaded your paper, click the “Submit” button. This alerts your instructor that you have submitted your paper for grading.
Additional Resources
Cyberspace resources:
A who’s who of Mideast-targeted malware – CNET News – 31 Aug 2012
China and its Double-edged Cyber-sword – 09 Dec 2010
Cyber Intelligence – Setting Landscape for Emerging Discipline – Sep 2011
Cyber OPSEC – An F-22 Case Study – Feb 08
Cybersecurity – Authoritative Reports and Resources – 26 Apr 2012
Defenseless on the Net – 18 Apr 2008
Emerging Cyber Threats Report 2013 (George Tech) – Nov 2012
Exposing One of China’s Cyber Espionage Units – Feb 2013
Foreign Spies Stealing U S Economic Secrets In CyberSpace – Oct 2011
PLA SIGINT and Cyber Recon Infrastructure – 11 Nov 2011
PRC Capabilities Computer Network Ops and Cyber-Espionage – 07 Mar 2012
Recruiting for the Cyber Wars – 18 Apr 2008
Silicon Scanning discovers backdoor etched into military chip – 05 Mar 2012
The New CI Response to the Cyberthreat – MIPB Jul-Sep 2003 Vol 29 Issue 3
The New E-Espionage Threat – 18 Apr 2008
US Army Geotags and Location Based Social Networking – 05 Dec 2010
Counterterrorism resources:
Al-Shabaab
50 Terror Plots Foiled Since 911 – 25 Apr 2012
Convergence – Illicit Networks and National Security in the Age of Globalization – 2013 – Link to book
Counterterrorism Intel – Law Enforcement Perspectives – Sept 2011
DoDI 5240.26 – Countering Espionage, Internl Terrorism, and the CI Insider Threat – 4 May 2012
Dynamic Terrorist Threat – Assessment of Motivations and Capabilities – 2004
FBI and Terrorism Investigations – 24 Apr 2013
Growing Terrorist Threat – Mar 2010
Info Sharing Dot Connecting and Intel Failures – Revisiting Conventional Wisdom – 2009
NCTC Intelligence Guide For First Responders – 2010
US National Strategy for Counterterrorism – June 2011
Start Date
Jan 2, 2023 12:05 AM
Due Date
Feb 12, 2023 11:55 PM
Hide Rubrics
Rubric Name: INTL Analysis Paper V2