Once your group has chosen a piece of critical technology( Choose- Information system technologies) , each student must prepare a counterintelligence threat assessment of 800–1,000 words about the group’s selected technology.
Using the information from the course materials, the textbook, outside research, and the small group discussion, provide a threat assessment introduction on counterintelligence collection.
Such as the use of infiltration within a given entity or agency
Surveillance to include but no limited to wiretap, photography, listening devices/ bugs within organization
Phishing – or use of vague questioning to personnel in an attempt to acquire critical data
Spying or other forms of espionage
What methods and techniques are used in counterintelligence collection? Explain.
What are common sources for counterintelligence? Explain.
Using the information from the course materials, the textbook, outside research, and the small group discussion, draft the body of your counterintelligence threat assessment about the selected technology. The assessment should include the following sections:
A description and brief summary of the technology
Applications for which the technology is used
Which organizations use this piece of technology
Who develops or manufactures this technology
Which foreign adversaries are potentially interested in this technology
Methods this adversary may use to acquire this technology
Implications if this technology were to be compromised
Possible vulnerabilities for protecting this technology
Recommendations to safeguard this technology
Compile your responses in your final individual threat assessment, and submit the file.