25 May Isis Terror Group
DONT FLOOD WITH REQUESTS UNLESS YOU HAVE READ THE REQUIREMENTS> IF YOU DO I WILL IGNORE YOU. MUST HAVE THE RATING TO BACK UP YOUR CLAIMS. SORRY, TOO MANY TIMES I HAVE BEEN BURNED
* THIS MUST BE DONE BY THE DEADLINE. NO EXCEPTIONS, NO DISCUSSION. *
PRIORITY WILL GO TO THOSE I KNOW AND TRUST
I AM NOT A LIBERAL AND DO NOT WRITE LIKE ONE. IF YOU LIKE SOCIALISM OR DISLIKE THE U.S. PLEASE DONT WASTE MY TIME. THE WRITING MUST BE CENTER / RIGHT. I DO NOT ENJOY REWRITING ENTIRE PAPERS I PAY FOR
There is an expression often used by military historians that says, “Know thy enemy.” One reason to adhere to such an adage is that knowing your enemy’s philosophy, capabilities, habits, fears, strengths, and more allows one to better design appropriate defenses and preventative measures. This tenet is not always well-considered or remembered, however.
For this unit, you will think like an adversary of the United States. At the same time, you will consider and describe (or perhaps “invent”) technological concepts and constructs similar to those employed by the U.S. to include communication networks, fusion centers, a viable information sharing environment, and other technologies possibly used in creative ways. (An example is using a cell phone as a remote detonating device for an improvised explosive device (IED).) You may also describe technologies not known in current use, but these choices must have some citable basis in reality. Make such descriptions persuasive if you elect to use these.
Assignment Guidelines
- Address the following in 4–6 pages:
- Describe your selected entity—is it a cell, a terrorist network, a nation-state sponsoring terrorists, a conventional nation that opposes the U.S., or some other form?
- Your selection and description may be hypothetical, based on real-world organizations or governments, or a combination of both. You are not limited to terrorist organizations or networks.
- What are at least 5 main technological types and/or tools used by your selected entity with regard to information sharing and intelligence gathering? Explain.
- Describe the adversary’s version of the following:
- Communications networks
- Fusion centers
- Information sharing environment (ISE)
- Detection tools
- Surveillance capabilities
- Assuming your adversary is unconcerned with ethics, describe at least 3 of the unethical or immoral ways this enemy uses technology to attempt to attack or defeat the United States or its allies.
- What are 3 unethical ways this entity or its sponsor employs the technologies against their nation’s own population? Explain in detail.
- For all of these unethical acts, include details about the motives behind precise uses.
- Lastly, having considered in detail the ethical violations involved in studying your enemy’s leveraging of technology, contemplate and discuss under what circumstances or justifiable cases the U.S. might employ similar methods;
- Remember to defend your answers with evidence or critically derived arguments.
- Describe your selected entity—is it a cell, a terrorist network, a nation-state sponsoring terrorists, a conventional nation that opposes the U.S., or some other form?
- Note: You do not need to necessarily agree with the identified or invented unethical practices; describe them as potential motives, uses, or justifications as objectively as you can, avoiding inserting your opinion or emotion into your answer.
- Be sure to reference all sources using APA style.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
