Sign In
Not register? Register Now!
Pages:
13 pages/β‰ˆ3575 words
Sources:
Check Instructions
Style:
APA
Subject:
Creative Writing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 52.65
Topic:

Securing the Integrity of Intelligence

Essay Instructions:

Your final paper is where you will weave the first two elements (the White Paper and Literature Review) together, and incorporate your analysis, to create a coherent paper that is 13-15 pages in length. While it is inappropriate (not to mention a violation of university policy) to cut-and-paste from past assignments in old courses into new ones, this research project is evolutionary and builds itself up from a white paper into a completed product. For this reason, in this class it is permissible to paste the information (as appropriate and as it makes sense) from the first two assignments assigned into your final assignment.
You are encouraged to refer to Belcher, Wendy Laura. 2009. "Editing Your Sentences." In Writing Your Journal Article in 12 Weeks: A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing. Additionally, you should refer to the University of Purdue's Online Writing Lab (OWL) to find out more about writing a white paper.
Format: Your final paper should include a title page, body, and reference page. Your paper should have one-inch borders on all four sides, use times new roman-12 point font, be double spaced, and not have an extra space in-between paragraphs. (You may need to turn this off in MS word by going to "paragraph" and clicking 'Don't add space between paragraphs of the same style'). Since this is an INLT course you need to use the Turabian author-date (aka parenthetical) style with a "References" page.
Your final papers should include the following sections.
Introduction. This section should be written last and should pull from some of the elements of your white paper. You will need to clearly provide an overview of the topic you are writing about, a concise synopsis of the issues, state your issue, and discuss why the situation is important to investigate. Writing the introduction last is helpful in ensuring that you've incorporated any changes that may have taken place over the course of your research. This section should be about 1 page in length.
Literature Review. Your literature review section is a synthesis of the sources that you identified in your second assignment in addition to other sources that you have identified to support your research. This section should be 5-6 pages in length.
Analysis and Findings. This section and the conclusion discussed below are essentially the two newest components of your final paper. You analysis and findings section should provide a narrative of your analysis and the analytical arguments that you will make as a result of your findings. In this section you will discuss ... Within this section you should provide support that answers your research question. This section should be 5-6 pages in length.
Conclusion. This section will contain concluding analytical arguments based on what the analysis has revealed. Here you will discuss some of the techniques and strategies that can be used to help..
Like any conclusion, it should provide a synopsis of the project, the strategy, the results, and what the analysis adds to our body of knowledge. Within your conclusion you should also offer suggestions for avenues of future research for other scholars as all knowledge is evolutionary. This section should be 1-2 pages in length.
References. This section will contain all of the sources you made reference to within the body of your paper. The should be listed using the Turabian author-date form and arranged alphabetically according to author last name.
Submission Instructions:
Submit your final paper under "Assignment 3: Final Paper," as a word document. Once uploaded, your assignment will be submitted to "Turnitin." Due Sunday, 11:55pm EST at the end of Week Seven.

Essay Sample Content Preview:

Securing the Integrity of Intelligence
Name
Institution
Due Date
Securing the Integrity of Intelligence
Introduction
Information security is of paramount importance to intelligence collection. Intelligence is information of high value and must be collected in secret. Confidentiality is also important at all levels of the agents who handle the intelligence (Mandel & Tetlock, 2018). The intelligence should only be accessed by the authorized individuals with the clearance to act on it accordingly. Ensuring the information is safely relayed to the intended recipients without compromising its integrity is difficult. Suppose the information is leaked at any stage or is accessed by an unauthorized individual. In that case, it may be relayed to enemies/competitors, and the information could lead to its strategic advantage. It is important to find new ways to ensure that the information does not reach malicious people or lose its strategic advantage to the collector. Collecting, storing, and transmitting digital information is increasingly becoming difficult, especially through the internet. Hackers and other malicious individuals are increasingly creating tools to access the information and either alter, delete or duplicate it. All these possible scenarios compromise intelligence.
If intelligence reaches any unintended recipient, it can easily lose its strategic advantage to the collector. Intelligence is most vulnerable when being transmitted and or stored. If the channel or storage medium is compromised, all the information could be altered, deleted, or duplicated to serve the interests of the enemy. For example, if the Taliban get intelligence that the US military was about to bomb their camp using missiles, they can either flee or create countermeasures. Therefore, the US military's efficacy to neutralize the Taliban target is highly dependent on the Taliban never getting the information. This is the very reason why high-value targets of the military remain a secret and is only discussed by high-ranking officers. The world was informed about the operation that killed Osama Bin Laden after the US military had completed the mission ADDIN EN.CITE Mark Mazzetti2011 (Mazzetti, Cooper, & Baker, 2011)12Mark MazzettiBehind the Hunt for Bin Laden2011 (Mazzetti, Cooper, & Baker, 2011). If the information had reached Osama before the operation, possibly he could have escaped and or deployed other defensive measures to avoid being captured or killed by the US military. Closely guarding intelligence is very important. However, even the party being spied on is also trying to get a strategic advantage over its enemy and has its intelligence network. Part of the network is to find ways to intercept the intelligence to deploy countermeasures to the intelligence.
This study provides several reasons why securing intelligence is important. First, it loses its strategic advantage immediately it is accessed by anyone other than the people authorized to do so. It can easily reach the enemies who find ways to counter the strategic advantage of the information (Gill, 2018). It can also be embarrassing to let the enemy know your secrets as nearly every action is met with a well-fashioned reaction to it. If each progra...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!