I will added everything you need all the readings, also week six is not up yet but I will added it next week I wanted to give you a head start. I will add my midterm paper and how to make it better because he took off a lot I did get a B, but I need better. On my midterm paper I did add a few things he had to say. really need this paper to be good. Once again I will add week 6 things this coming week thank youAssignment InstructionsBuilding
on the information that you prepared from your Midterm Assignment,
prepare a new research paper that addresses the below information in 5-7
full pages of content (not counting title or reference pages):For the terrorist organization likely to conduct an attack within the United States that you selected, determine: – What domestic data collection programs would be best utilized on the organization you selected? (Intelligence Collection disciplines discussed in week 5) Do not focus on overseas intelligence collection programs; this is an HLSS course and we are focused only on the homeland. – Which members of the IC would be the best collectors of intelligence on this particular organization? (we discussed the agencies of the intelligence community in week 2)
You may address agencies that collect overseas and within the homeland
as the terrorism nexus overlaps both domains. You may also consider some
of the field agencies of DHS (since DHS I&A is just an office and
does not collect) as some of the operating components do collect
like ICE, CBP, USCG, and the Secret Service (who does focus on terrorism
financing). Again, this is a Homeland Security course, so focus on the
agencies that can support the homeland (like the FBI), not primarily
overseas intelligence collection of foreign targets. – What intelligence analysis strategies would be the most effective and why? (choose only from the strategies discussed in the week 6 lesson).
Remember that critical thinking is not a strategy — be specific about
what you think will help analyze what we collect on a clandestine
terrorist group attempting to attack the U.S. homeland.Note:
As a paper for this HLSS course, these questions are to be answered as
it relates to collecting and analyzing intelligence on the terrorist
group plans and activities within the U.S. as they prepare to attack so
that law enforcement and security officials here in the homeland can
detect, identify, and warn on this potential or hypothetical attack. You
do not need to address how to stop this attack, that will be the
subject of your recommendations in your final paper. Only address your
hypothetical attack using a paragraph or two (unless you were specifically told that you did not address the attack in sufficient detail in your midterm).This
progress paper will set the stage for your final paper where you will
then discuss how intelligence, law enforcement and homeland security
officials from all three levels of government can prevent or disrupt
this attack (as well as your recommendations to them in your final
paper). Therefore, do not address measures to stop or interdict the terrorists in your progress paper, only
focus here in this paper on intelligence collection disciplines, the
most appropriate IC agencies to play a role, and the most effective
analytical techniques to employ in this scenario. I would also remind you that the
CIA does not collect anything domestically, they are a foreign
intelligence agency. See the readings from week 5 as well as this link
to Executive Order 12333 https://www.cia.gov/about-cia/eo12333.html.
The NSA is very different as they can and do collect both foreign and
domestic communications when authorized by a court (like FISA) or under
certain conditions by the Attorney General (to support the FBI). See https://www.nsa.gov/about/faqs/sigint-faqs.shtml The
Progress Assignment is due on Sunday of Week 6. The analysis must be
double spaced and follow APA guidelines (in -text parenthetical citation
format, not endnotes or footnotes) and be free of typographical,
spelling and grammatical errors (see example paper). 5 is the minimum
number of pages of content not counting title page and reference
page. Name the assignment “LastnameHLSS320Progresspaper.doc”. Compliance
with the above directions, quality of your analysis, and the SSGS
Assignment Rubric for 300-400 Level Classes will be used to evaluate
this assignment. Assignment RubricClarification
on assignments: The first paper (the midterm, your Red Cell paper) was
about the terrorist group you selected and was basically from the
terrorist perspective, and it should have addressed attack scenarios of
how your group could attack the U.S. Homeland. The second paper (the
progress assignment) is from the friendly perspective and is on how the
U.S. can do intelligence collection and analysis on the terrorist group:For the final
assignment, it will give you an opportunity to describe how to stop the
attack by making your own recommendations based on what you learned.Note:
You must use APA (in-text parenthetical) format [but not endnotes or
footnotes] in HLSS owned courses. The APUS library has many useful
documents, videos and guides on how to research, write and cite for
college level papers. See http://www.apus.edu/Online-Library/resources-services/resources/student-academic-resource-center.html. I
have also attached an example papers to the assignment instructions for
your midterm that you should use as a template for your papers in this
course. Make
sure you read the instructions carefully and that you focus your paper
on answering the assigned question. This assignment is a research paper, not an opinion paper, so you need to cite scholarly sources to support your thesis. Make sure you use APA style in-text parenthetical citations at
the end of every sentence where you are quoting or paraphrasing
another’s ideas (or any information) that is not your own thoughts and
words, like this (Bergen, 2015, para 14). I highly recommend you use the
APUS writing guide based on the APA style which can be found in the
university library or at this link: APUS Style Guide for APA.
You are welcome to use supplementary sources to compliment the assigned
readings based upon your research, but make sure you use scholarly and
credible sources. See the APUS Library Homeland Security Program Guide for good sources, as well as the APUS Research Primer and the APUS Library Research FAQs. Requirements:- 5-7 Full pages of text (not counting title page or references). 5 FULL pages of content is the minimum acceptable length- Written according to the APA style and format;- Use Times New Roman 12 point font;- 1 inch margins on all sides with no paragraph indentation other than the first line by .5 inches – Double
space all text (no extra lines or spaces after a paragraph or section
headings and no added font sizes or lines either) A
respectable number of credible resources used, cited in the paper as
in-text citations, and included on the reference page. A good rule of
thumb is at least 2 scholarly sources per page of content (at least 10
scholarly references for this 5 page paper). Use those sources provided
to you throughout the course (listed in the announcements), as well as
other material obtained from conducting your own research. Freely
utilize appropriate and reputable academic sources, summarize in your
own words and cite accordingly.Be mindful of excessive direct quotes as the paper should not contain just a string of various quotations. Make sure you comply with all academic integrity standards expected by APUS and as slide 14 of the APUS Academic Integrity presentation
posted in course syllabus (and the week 1 introduction forum) states
“Quotes cannot make up more than 10% of the text of your assignment.” So paraphrase where you can and provide your own analysis and synthesis of your research. See
the syllabus tab within this course for more important information on
academic integrity and the repercussions of plagiarism.
midterm_assignment_isis.docx

reading_intel_paper.docx

Unformatted Attachment Preview

1
Isis
Christopher Hawthorne
Professor Jeffery Gardner
18, April, 2017
Isis
2
Isis
Table of content
1.0…………………………………………………………………………………Introduction
1.1…………………………………………………………………………………Body
1.1.0……………………………………………………………Islamic ideology
1.1.1……………………………………………………………To take over the world
1.1.2……………………………………………………………Financial institution
1.2…………………………………………………………………………………Conclusion
1.3…………………………………………………………………………………reference
3
Isis
1.0 introduction
Following the recent missile attack by the US that was targeting the ISIS, my focus will
be on the possibility of ISIS revenging; they are a bunch of savages.
ISIS is an abbreviation of Islamic States of Iraqi and Syria. It is an unrecognized pro-state
militant group and is considered one of the most successful to have existed. It originated from
Jama ‘at al Tawhid that took part in the Iraqi insurgency and proclaimed itself a worldwide
caliphate. Many countries with UN among them refer to this group as a terrorist group. The
group is highly destructive and is known for video beheadings of its prisoners. ISIS has
bureaucratic hierarchy of leaders. The groups’ territories include oil fields that is a major source
of income.
Though the adoption of the name Islamic states has been greatly criticized, the group
claims authority over all Muslims across the world.
The group is believed to be fully operational in over 18 countries and is seemingly
growing to other countries.
4
Isis
1.1 body
Islamic States ideology is the establishment of a theological empire also known as the
Caliphate to be ruled by a single political and religious leader according to Sharia; the Islamic
law. ISIS can be traced back to 2003 when US among other Nations successfully killed Saddam
Hussein whose regime was full of war against humanity.
Their main objective to taking over the world is to influence people mainly youth into
joining them to help them expand and grow stronger. They want a global leader and they believe
the only way to come to this is through a global war. They teach extremism and influence their
prey such that they lose their minds; they are taught that if they die in that path of seeking the
truth, they shall enter paradise.
Abu Bakr al-Baghdadi is deemed to be the leader of this pro-militia group. The figure is
quite shadowy and little is known about him. Though there are claims that he studied at various
courses at certain universities within Iraq and that he later taught as a lecturer, none of this has
yet been clarified.
Islamic states are known for exploiting the area around them as a means of acquiring
funds to enhance their operations. They control financial institutions, tax and oil. Exporting of oil
from oil fields captured by Islamic states earns them a fortune since it is estimated to earn over
US$1 million a day. This is believed to be one of the greatest means of making money. They are
also believed to taking captives and asking for ransoms in exchange for their freedom. In this
case they just don’t kidnap everybody but rather relatives of tycoons who can be able to raise the
crazy amount of cash they ask for. Some countries and individuals are also believed to making
donations to this ruthless group with Qatar being in the spotlight. It was believed that the group
5
Isis
acquired a lot of wealth when it captured Mosul through looting. Sale of antiques and artifacts is
believed to be the second largest source of income. This is because they looted a grand palace
and smuggled the treasure to other countries for sale.
The US has constantly been coming into the way of the ISIS achieving their ultimate goal
which is to rule the world with the sharia law put in place. Recently on April 3rd US launched a
missile that was targeting the ISIS that saw them loose some of their men and weapons. In Iraq
the US has been supporting the government in the war against this group and they lost quite a
number of wars hence lost some of their territories to the government and the US forces. They
must be very bitter and I believe that they will soon hit back at the US who are seemingly getting
into their way.
Firstly, there is a very high possibility of US being massively hit bearing in mind that
Trump doesn’t seem to be cooperating with countries like Iran, Russia and Syria itself. Unlike
the former presidents, Trumps regime might be a little different because he works his way. The
United States can never go it alone and win this war unless they add more troops to their forces
and invest heavily on it at the same time and this might not be easy. Trump’s relation with other
countries might make ISIS come out strong since some of them might start turning their backs on
US and supporting ISIS. Trump is known for his famous radical phrase ‘Islam hates us’ thus his
war seems to be directly on Muslims rather than the terrorist groups. This poses a great danger to
the US since the angered Muslim nations can opt to support ISIS to fire back.
Secondly, Islamic state might not physically come and attack the United State but rather
some of its supporters within the US might slowly revenge, Trump’s relation with the local
6
Isis
Muslims has never been good hence the likelihood of having a few haters is a real thing. He
seems to be promoting radicalism among his citizens and that comes with many problems.
Thirdly, the Islamic States might opt to take US citizens who travel to other countries as
tourists or even researchers their captives. It’s not the best alternative but this will hurt US
directly.
ISIS is known to possess chemical weapons; ISIS has attacked civilians with the
chemical and killed hundreds. They are also known to possess vast number of assault and battle
riffles, sniper rifles, machine guns, pistols, explosives and anti-tank weapons and anti-aircraft
launchers, towed artillery, tanks and armored fighting vehicles, artillery, aircraft and watercraft.
7
Isis
1.2 Conclusion
The chances of the US being attacked by the ISIS are generally very high. Considering
that the US president hasn’t been cooperating with other nations it might not receive the support
it requires in the war against this ruthless group.
Secondly presidents Trump belief that Muslims are the countries enemies might just be
another trouble. Since his inauguration he has raised a new travel ban that blocks migrants from
many Islamic countries. This brings hatred and thus may lead them encourage and help ISIS
attack US.
To win this battle the United States must ensure good relation with other countries like
Russia, Iran and Syria. The president must also ensure he wins local Muslims loyalty. In so
doing they will easily win the battle since by having a good relation with those countries they
will get to know a lot about the enemy. Once the enemy is known inside out it is quite easy to
deal with them effectively.
8
Isis
1.3 reference
Adan Suleiman, (June 26th 2014) inside the Middle East Retrieved from
http//:www.christianpost.com
Christian Morison (May 2015) The Sun magazine about the Middle East, Retrieved from
http//:www.thesun.com
Amanpor (December 2014) CNN, inside the Middle East; ISIS, Retrieved from
http//:www.cnn.com
Edgar Owen, (January 20th 2015) The National Magazine, Retrieved from
http//:www.crethiplethi.com
Thank you for your work on this midterm paper. Your assignment was to select a terrorist
organization likely to conduct a terrorist attack in the U.S. and complete an in-depth profile on
the organization in 5-7 pages. Your task was to explain the organization’s origins, ideology,
goals & objectives, leadership, funding, and capabilities and describe how you envision this
group actually conducting an attack within the United States, such as the known and suspected
weapons/lethal agents and delivery methods, and the tactics, techniques and procedures that they
may use in conducting the attack within the U.S. homeland. Below is your grade breakdown and
some comments are also included within your paper using GRADEMARK (see below). Make
sure you incorporate my input into your future papers. Your paper was graded based on the
SSGS grading rubric for 300-400 level courses as follows:
17/20 Focus/Thesis
16/20 Content/Subject Knowledge
18/20 Critical Thinking Skills
9
Isis
15/20 Organization of Ideas/Format
16/20 Writing Conventions
Final Grade: 82
You can view my comments/corrections directly on your paper in grademark. Click on the
percentage % number next to your paper file where it is green, yellow, or red. Your paper will
open in turnitin. In the upper left you’ll see ORIGINALITY in red, GRADEMARK, and
PEERMARK. Click GRADEMARK and then your paper will open and you can scroll down
(The tab will turn blue once you click on it). Hover your mouse over the blue bubbles to read the
full comments I made.
WEEK 2: INTELLIGENCE COMMUNITY
ORGANIZATION
Lesson
Last week we explored the relatively short history that the United States has of intelligence being
a key component of national security. However, even in that short history several changes have
taken place. Since the events of September 11, 2001 there has been a significant reorganization
of the intelligence leadership and capabilities at the federal level. The primary purpose of the
reorganization was to improve critical shortfalls in communication efforts and information sharing
that were identified within the 9/11 Commission Report. (U.S. National Commission on Terrorist
Attacks Upon the United States, The 9/11 Commission Report (Washington, D.C.: GPO, 2004), pp.
399, 411.)
The two most notable changes that occurred were:
1.
2.
The Homeland Security Act of 2002 (P.L. 107-296), which formally created the
Department of Homeland Security (DHS); and (U.S. Congress. House of Representatives.
Select Committee on Homeland Security. Homeland Security Act of 2002, 107th Cong., 2d
sess., 2002. HR Rep. 107-609, pt. 1.)
The Intelligence Reform and Terrorism Prevention Act of 2004 (P.L 108-458), which
created the Office of the Director of National Intelligence (ODNI) (Intelligence
Authorization Act for Fiscal Year 2003, Public Law 107–306, 107th Congress (November
27, 2002).
Prior to these events there was not a cabinet level department that had specific responsibility to
unify and execute all homeland security initiatives and the director of the Central Intelligence
Agency (CIA) was the U.S director of intelligence. With the passages of these two acts DHS is now
charged with safeguarding the country against acts of terrorism and the director of ODNI serves
as the director of national intelligence (DNI).
INTELLIGENCE TIMELINE








1947-2004: CIA Director is U.S. Director of Intel
events of 2001
9/11 Report
HLSAct 2002
DHS Opens its Doors (2003)
Intel Act 2003
ODNI established
Lead of ODNI is DNI
Currently in the United States, the intelligence community (IC) is comprised of 17 entities,
including ODNI who is the lead for all of the IC and ensures seamless intelligence integration.
Each of the 16 organizations function under their own directives; however, they also collectively
work together to ensure the security of the country. (An Overview of the United States
Intelligence Community for the 111th Congress (2009), http://www.dni.gov/overview.pdf)
The following descriptions of the IC are based on direct excerpts from the Office of the Director of
National Intelligence’s webpage.
Office of the Director of National Intelligence
The Director of National Intelligence serves as the head of the Intelligence Community, overseeing
and directing the implementation of the National Intelligence Program and acting as the principal
advisor to the President, the National Security Council, and the Homeland Security Council for
intelligence matters related to national security.
Working together with the Principal Deputy DNI and with the assistance of Mission Managers and
Deputy Directors, the Office of the DNI’s goal is to effectively integrate foreign, military and
domestic intelligence in defense of the homeland and of United States interests abroad.
With this goal in mind, Congress provided the DNI with a number of authorities and duties, as
outlined in the Intelligence Reform and Terrorism Prevention Act of 2004 including to:







Ensure that timely and objective national intelligence is provided to the President, the
heads of departments and agencies of the executive branch; the Chairman of the Joint
Chiefs of Staff and senior military commanders; and the Congress.
Establish objectives and priorities for collection, analysis, production, and dissemination of
national intelligence.
Ensure maximum availability of and access to intelligence information within the
Intelligence Community.
Develop and ensure the execution of an annual budget for the National Intelligence
program based on budget proposals provided by IC component organizations.
Oversee coordination of relationships with the intelligence or security services of foreign
governments and international organizations.
Ensure the most accurate analysis of intelligence is derived from all sources to support
national security needs.
Develop personnel policies and programs to enhance the capacity for joint operations and
to facilitate staffing of community management functions.
Oversee the development and implementation of a program management plan for acquisition of
major systems, doing so jointly with the Secretary of Defense for DOD programs, that includes
cost, schedule, and performance goals and program milestone criteria.
Air force Intelligence
The U.S. Air Force Intelligence, Surveillance, and Reconnaissance (USAF ISR) Enterprise is
America’s leading provider of finished intelligence derived from airborne, space, and cyberspace
sensors. The USAF ISR Enterprise delivers decision advantage in order to enable commanders to
achieve kinetic and non-kinetic effects on targets anywhere on the globe in support of national,
strategic, operational, and tactical requirements. The AF/A2 is the USAF’s Senior Intelligence
Officer and is responsible for functional management of all Air Force global integrated ISR
capabilities, including oversight of planning, programming, and budgeting; developing and
implementing the Air Force policies and guidance for managing Air Force global integrated ISR
activities; and professional development, training, education, readiness, and deployment of
50,000 military and civilian United States Air Force intelligence personnel.
Army Intelligence
U.S. Army Intelligence (G-2) is responsible for policy formulation, planning, programming,
budgeting, management, staff supervision, evaluation, and oversight for intelligence activities for
the Department of the Army. The G-2 is responsible for the overall coordination of the five major
military intelligence (MI) disciplines within the Army: Imagery Intelligence, Signals Intelligence,
Human Intelligence, Measurement and Signature Intelligence, and Counterintelligence and
Security Countermeasures.
Central Intelligence Agency
The Central Intelligence Agency (CIA) is responsible for providing national security intelligence to
senior U.S. policymakers. The CIA director is nominated by the president and confirmed by the
Senate. The director manages the operations, personnel and budget of the CIA and acts as the
National Human Source Intelligence manager. The CIA is separated into four basic components:
the National Clandestine Service, the Directorate of Intelligence, the Directorate of Science &
Technology, and the Directorate of Support. They carry out “the intelligence cycle,” the process of
collecting, analyzing, and disseminating intelligence information to top U.S. government officials.
Coast Guard Intelligence
The Coast Guard’s broad responsibilities include protecting citizens from the sea (maritime safety),
protecting America from threats delivered by the sea (maritime security), and protecting the sea
itself (maritime stewardship). The Coast Guard’s persistent presence in the maritime domain, due
to its diverse mission sets and broad legal authorities, allows it to fill a unique niche within the
Intelligence Community. Because of its unique access, emphasis, and expertise in the maritime
domain Coast Guard Intelligence can collect and report intelligence that not only supports Coast
Guard missions, but also supports national objectives. Coast Guard Intelligence strives to create
decision advantage to advance U.S. interests by providing timely, actionable, and relevant
intelligence to shape Coast Guard operations, planning, and decision-making, and to support
national and homeland security intelligence requirements.
The Coast Guard became a member of the Intelligence Community Dec. 28, 2001.
Defense Intelligence Agency
The Defense Intelligence Agency is a Department of Defense combat support agency. With more
than 16,500 military and civilian employees worldwide, DIA is a major producer and manager of
foreign military intelligence and provides military intelligence to warfighters, defense policymakers
and force planners, in the DOD and the Intelligence Community, in support of U.S. military
planning and operations and weapon systems acquisition. The DIA director serves as principal
adviser to the secretary of defense and to the chairman of the Joint Chiefs of Staff on matters of
military intelligence. The director also chairs the Military Intelligence Board, which coordinates
activities of the defense intelligence community.
Department of Energy
The U.S. Department of Energy’s Office of Intelligence and Counterintelligence is responsible for
the intelligence and counterintelligence activities throughout the DOE complex, including nearly 30
intelligence and counterintelligence offices nationwide. The mission is to protect, enable, and
represent the vast scientific brain trust resident in DOE’s laboratories and plants. The office
protects vital national security information and technologies, representing intellectual property of
incalculable value, and provides unmatched scientific and technical expertise to the U.S.
government to respond to foreign intelligence, terrorist and cyber threats, to solve the hardest
problems associated with U.S. energy security, and to address a wide range of other national
security issues.
Department of Homeland Security
The Office of Intelligence and Analysis is responsible for using information and intelligence from
multiple sources to identify and assess current and future threats to the U.S. DHS Intelligence
focuses on four strategic areas: Promote understanding of threats through intelligence analysis;
Collect information and intelligence pertinent to homeland security; Share information necessary
for action; and Manage intelligence for the homeland security enterprise. The Under Secretary for
I&A also serves as DHS’ chief intelligence officer and is responsible to both the secretary of
Homeland Security and the director of National Intelligence.
Department of State
The Bureau of Intelligence and Research provides the Secretary of State with timely, objective
analysis of global developments as well as real-time insights from all-source intelligence. It serves
as the focal point within the Department of State for all policy issues and activities involving the
Intelligence Community. The INR Assistant Secretary reports directly to the Secretary of State and
serves as the Secretary’s principal adviser on all intelligence matters. INR’s expert, independent
foreign affairs analysts draw on all-source intelligence, diplomatic reporting, INR’ …
Purchase answer to see full
attachment