Describing the adversary’s version of Communications networks
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
Describing the adversary’s version of Communications networks
Dont Flood With Requests Unless You Have Read The Requirements> If You Do I Will Ignore You. Must Have The Rating To Back Up Your Claims. Sorry, Too Many Times I Have Been Burned
* This Must Be Done By The Deadline. No Exceptions, No Discussion. *
Communications networks
Priority Will Go To Those I Know And Trust
Communications networks
I Am Not A Liberal And Do Not Write Like One. If You Like Socialism Or Dislike The U.S. Please Dont Waste My Time. The Writing Must Be Center / Right. I Do Not Enjoy Rewriting Entire Papers I Pay For
Communications networks
There is an expression often used by military historians that says, “Know thy enemy.” One reason to adhere to such an adage is that knowing your enemy’s philosophy, capabilities, habits, fears, strengths, and more allows one to better design appropriate defenses and preventative measures. This tenet is not always well-considered or remembered, however.
For this unit, you will think like an adversary of the United States. At the same time, you will consider and describe (or perhaps “invent”) technological concepts and constructs similar to those employed by the U.S. to include communication networks, fusion centers, a viable information sharing environment, and other technologies possibly used in creative ways. (An example is using a cell phone as a remote detonating device for an improvised explosive device (IED).) You may also describe technologies not known in current use, but these choices must have some citable basis in reality. Make such descriptions persuasive if you elect to use these.
Assignment Guidelines
- Address the following in 4–6 pages:
- Describe your selected entity—is it a cell, a terrorist network, a nation-state sponsoring terrorists, a conventional nation that opposes the U.S., or some other form?
- Your selection and description may be hypothetical, based on real-world organizations or governments, or a combination of both. You are not limited to terrorist organizations or networks.
- What are at least 5 main technological types and/or tools used by your selected entity with regard to information sharing and intelligence gathering? Explain.
- Describe the adversary’s version of the following:
- Communications networks
- Fusion centers
- Information sharing environment (ISE)
- Detection tools
- Surveillance capabilities
- Assuming your adversary is unconcerned with ethics, describe at least 3 of the unethical or immoral ways this enemy uses technology to attempt to attack or defeat the United States or its allies.
- What are 3 unethical ways this entity or its sponsor employs the technologies against their nation’s own population? Explain in detail.
- For all of these unethical acts, include details about the motivesbehind precise uses.
- Lastly, having considered in detail the ethical violations involved in studying your enemy’s leveraging of technology, contemplate and discuss under what circumstances or justifiable cases the U.S. might employ similar methods;
- Remember to defend your answers with evidence or critically derived arguments.
- Note: You do not need to necessarily agree with the identified or invented unethical practices; describe them as potential motives, uses, or justifications as objectively as you can, avoiding inserting your opinion or emotion into your answer.
- Be sure to reference all sources using APA style.
- Communications networks
RUBRIC
Excellent Quality
95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support
91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology
58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score
50-85%
40-38 points
More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points
Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points
Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality
0-45%
37-1 points
The background and/or significance are missing. No search history information is provided.
75-1 points
Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points
There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow Communications networks