In about 250 words for each question answer the following:
1) Describe HUMINT an
In about 250 words for each question answer the following:
1) Describe HUMINT and its role in intelligence collection? What kinds of intelligence can HUMINT provide that no other type of intelligence can easily collect? Do not focus on how collection is done. Focus on the type of information that is collected.
2) Describe overt, clandestine, and covert HUMINT. What are the primary advantages and disadvantages of overt and clandestine HUMINT?
3) Discuss the STUXNET malware used against Iran. What was it, what intelligence collection was required to support it, how did it work, how was it likely introduced, and what was its overall effect?
4) Describe the four categories of Open Source information listed in the readings. Describe the top four obstacles to effectively using OSINT? Is OSINT a new concept in the intelligence community?
5) What is COMINT? What are some of the limitations and problems of using COMINT?
Submit your answers in a single MS Word document. Please use the assigned course readings. To earn points you MUST demonstrate that you’ve read and comprehended the content of the material linked below! Also conduct your own research using outside materials.
Please note that when you submit your assignment, your Turn-it-in report now shows the level of AI content in your answers.
Please use the assigned course readings. To earn points you MUST demonstrate that you’ve read and comprehended the content of the material linked below!
IN ADDITION, DO NOT USE QUOTES IN ANY OF YOUR ANSWERS
The genesis of this rule is that students have merely copy and pasted from the reading to the answer. That isn’t learning.
You can still cite your source, but the construction of the idea must be yours. This means you should read, internalize, swirl it around with what you already believe to be true, adjust your thinking appropriately, then write in your own words your understanding. You should make sure that you present examples (real-life, with dates, places, names, etc.) to show what you mean—or when asked). 250 words can seem limiting. However, it is enough for you to present the concepts, the definitions if necessary, then show how those concepts and ideas come to life in the real world.
By strictly avoiding quotes you will be showing me what you are learning, I will know that you’ve gone through the above process that takes the information, assimilates it, organizes it, and presents it in your words, supported by facts and examples.
Open source
Congressional research report on OSINT https://digital.library.unt.edu/ark:/67531/metadc819267/m2/1/high_res_d/RL34270_2007Dec05.pdf
CIA site: https://www.cia.gov/readingroom/docs/DOC_0006122487.pdf
HUMINT
Article on role of HUMINT https://www-tandfonline-com.ezproxy1.apus.edu/doi/full/10.1080/01495933.2010.50963595933.2010.509635
CIA website on HUMINT https://www.cia.gov/static/bbb80512b53518c1df68d9e230bd2cea/Fresh-Look-Collection-Requirements.pdf
HUMINT article https://www.afio.com/publications/SANO%20John%20on%20The%20Changing%20Shape%20of%20HUMINT%20Pages%20from%20INTEL_FALLWINTER2015_Vol21_No3_FINAL.pdf
Overt HUMINT article https://inpublicsafety.com/2016/10/why-overt-intelligence-is-important-but-often-undervalued/
Congressional Report on Covert and Clandestine Intelligence. https://sgp.fas.org/crs/intel/R45175.pdf
COMINT Collection
TechTarget website on COMINT: https://www.techtarget.com/whatis/definition/COMINT-communications-intelligence?Offer=abt_pubpro_AI-Insider
COMINT geolocation: https://www.youtube.com/watch?v=_Z19MSkG_D4
Koot Blog on general SIGINT: https://blog.cyberwar.nl/2014/10/sigint-definition-intrinsic-qualities-problems-and-limitations-quotes-from-aid-wiebes-2001/
NSA SIGINT Overview: https://www.nsa.gov/Signals-Intelligence/Overview/
Cyber
NSA Cyber article: https://www.wired.com/2013/06/general-keith-alexander-cyberwar/
