Sign In
Not register? Register Now!
Pages:
4 pages/β‰ˆ1100 words
Sources:
Check Instructions
Style:
APA
Subject:
Creative Writing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Securing the Integrity of Intelligence: Creative Writing Essay

Essay Instructions:

nstructions:
Within INTL502 you are required to identify an intelligence collection-related issue that requires a solution. In this case, you will select a topic or issues as it relates to your literature review (assignment 2), and final paper (assignment 3).
You are encouraged to refer to Belcher, Wendy Laura. 2009. "Editing Your Sentences." In Writing Your Journal Article in 12 Weeks: A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing. Additionally, you should refer to the University of Purdue's Online Writing Lab (OWL) to find out more about writing a white paper.
The goal of this assignment is to present a clear white paper. Your white paper should be between 3-4 pages in length, not including your references.

You will need to:
1) Identify an intelligence collection related issue that requires closer examination.
2) Clearly state the problem.
3) Explain why this is an important issue. How will further research and solution assist with mitigating the effects of this issue?
4) Offer a set of solutions, with an optimal solution for recommendation.

Format. You paper should have one-inch borders on all four sides, use Times New Roman-12 point font, be double spaced, and not have an extra space between paragraphs. All references and citations must be in the Turabian author-date style format. Your submission should include:

Title Page. Ensure you include your title, student name, date of submission.

Introduction/Synopsis. Identify and introduce your key issue. Provide a succinct synopsis of the problem and why the issue merits further discussion and resolution.

Background/Problems. Outline the scope of the issue and provide background information to orient your audience. The focus of this section is to orient a decision-maker to key issues in order to facilitate the resolution of the problem on an understanding of the facts that you identify. This section should be supported by evidence - as opposed to opinion. It is imperative that you do not shift from the mail topic and pose issues that cannot be resolved.

Solution. Propose a set of solutions with pro's and con's to each. Recommend the optimal solution.

Conclusion. Write a conclusion in order to wrap up the white paper and enhance your readers' understanding.

References. Include the references you used to back up your statements on a separate "References" page.
Submission Instructions:
Submit your white paper under "Assignment 1: White Paper" as a word document. Once uploaded, your assignment will be submitted to "Turnitin." Due Sunday, 11:55pm EST at the end of Week Three.

Essay Sample Content Preview:

INTELLIGENCE COLLECTION ISSUE
Name:
Institution:
Course Code:
Date:
Securing the Integrity of Intelligence
Identify an intelligence collection related issue that requires closer examination.
Information security is of paramount importance to intelligence collection. Intelligence is information of high value and must be collected in secret. Confidentiality is also important at all levels of the agents who handle the intel. The intel should only be accessed by the authorized individuals with the clearance to act on it accordingly. Ensuring the information is safely relayed to the intended recipients without compromising its integrity is difficult. Suppose the information is leaked at any stage or is accessed by an unauthorized individual. In that case, it may be relayed to enemies/competitors, and the information could lead to its strategic advantage. It is important to find new ways to ensure that the information does not reach malicious people or lose its strategic advantage to the collector. Collecting, storing and transmitting digital information is increasingly becoming difficult, especially through the internet. Hackers and other malicious individuals are increasingly creating tools to access the information and either alter, delete or duplicate it. All these possible scenarios compromise the intelligence.
1 Clearly state the problem.
If intelligence reaches any unintended recipient, it can easily lose its strategic advantage to the collector. Intelligence is most vulnerable when being transmitted and or stored. If the channel or storage medium is compromised, all the information could be altered, deleted or duplicated to serve the interests of the enemy. For example, if the Taliban get intelligence that the US military was about to bomb their camp using missiles, they can either flee or create countermeasures. Therefore, the US military's efficacy to neutralize the Taliban target is highly depended on the Taliban never getting the information. This is the very reason why high-value targets of the military remain a secret and is only discussed by high-ranking officers. The world was informed about the operation that killed Osama Bin Laden after the US military had completed the mission CITATION Mar111 \l 1033 (Mazzetti, Cooper, & Baker, 2011). If the information had reached Osama before the operation, possibly he could have escaped and or deployed other defensive measures to avoid being captured or killed by the US military. Closely guarding intelligence is very important. However, even the party being spied on is also trying to get a strategic advantage over its enemy and has its intelligence network. Part of the network is to find ways to intercept the intelligence to deploy countermeasures to the intelligence.
2 Explain why this is an important issue. How will further research and solution assist with mitigating the effects of this issue?
There are several reasons why securing intelligence is important. First, it loses its strategic advantage immediately it is accessed by anyone other than the people authorized to do so. It can easily reach the enemies who find ways to counter the strategic advantage of the information. It can also be embarrassing to let the enemy know your secrets as nearl...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples: