Categories
Applied Sciences homework help

What federal agencies are responsible for each type of intelligence collection?

Second Mini Research Paper Topic and Annotated Bibliography
For this assignment, you will be required to submit a  research topic and complete an annotated bibliography of five resources for the second mini research paper.  This assignment will be one document in two parts.
Part 1: Your research topic requires you to research the five types of intelligence collection activities to include human intelligence (HUMNIT), signals intelligence (SIGNIT), measures and signatures intelligence (MASINT), imagery intelligence (IMINT), and open-source intelligence (OSINT).For your research, you will want to consider the following questions:
What federal agencies are responsible for each type of intelligence collection?
How are these types of intelligence collection activities used to counter domestic and global terrorist threats in today’s era?
Further explain how each intelligence collection activity could have been used to prevent a recent terrorist attack. Your submission should outline at least one recent domestic or international terrorist incident.
What challenges exist in utilizing each of the intelligence collection methods?
Part 2: Annotated BibliographyIdentify five scholarly sources from the CSU Online Library or other reliable source that support your research paper topic. Include a summary of 150–200 words for each reference that will cover the material related to the research paper criteria. As you locate your sources, consider how you will use them in your research paper.The annotated bibliography identifies the reference, description, and how it pertains to the research paper. Use APA Style to format the references.

Categories
Applied Sciences homework help

What types of intelligence analysis are performed by the National Counterterrorism Center (NCTC)?

QUESTION 1
What types of intelligence analysis are performed by the National Counterterrorism Center (NCTC)? How does the NCTC partner with the FBI’s Joint Terrorism Task Forces and Department of Defense’s combatant commands to counter terrorism? How does the NCTC compare and contrast to the FBI Counterproliferation Center?
Your response must be at least 200 words in length.

QUESTION 2
The lead federal government agency for intelligence and counterintelligence in the United States is the Central Intelligence Agency (CIA). The CIA states that there are five key challenges that exist today for their agency:

Close intelligence gaps with enhanced collection and analysis on the countries, non-state actors, and issues most critical to the President and senior national security team.
Fulfill our global mission to give customers decision advantage as they confront an unprecedented volume and diversity of worldwide developments that affect U.S. interests.
Leverage technological advances for better performance in all mission areas—collection, analysis, covert action, and counterintelligence—while protecting against technological threats to the security of our information, operations, and officers.
Improve the ways we attract, develop, and retain talent to maximize each CIA officer’s potential to contribute to achieving mission.
Better manage agency resources during a period of fiscal austerity.
Which of these challenges do you think is the most difficult today? Why? Offer two recommendations that could be implemented and enforced to address the key challenge you have chosen.
Your response must be at least 200 words in length.

Categories
Applied Sciences homework help

Do you believe that the federal government needs to amend the act to further outline the legality of leaking electronic documentation to the public (United States and abroad)? Why, or why not?

Q1 (3)There have been several individuals who have leaked highly classified (top-secret) material to the public in recent times, including Edward Snowden (former National Security Agency government contractor) and Bradley Manning (former U.S. Army service member). Each have been accused of violating the Espionage Act of 1917. Do you believe that the federal government needs to amend the act to further outline the legality of leaking electronic documentation to the public (United States and abroad)? Why, or why not? What additional safeguards should the federal government put into place to prevent classified materials from falling in the hands of the media or our foreign adversaries?
100 WORDS EACH ANSWER
Q2 (4)The emergence of technology, software, and hardware has made it very difficult for local, state, and federal law enforcement and intelligence agencies to investigate acts of terrorism. As an example, the Federal Bureau of Investigation (FBI) attempted to gain access to Syed Rizwan Farook’s cell phone shortly after the San Bernardino terrorist attack that killed 14 individuals and wounded 22 others on December 2, 2015. The FBI was initially unable to access the data on the cell phone because of Apple’s lock code and iOS on the iPhone. The FBI demanded that Apple assist in the investigation and provide access to the cell phone. In short, this led to a public debate between Apple and the FBI regarding privacy and intelligence-gathering. Do you believe it is important for manufacturers such as Apple, Google, Amazon, and others to provide a “back door” in order to assist local, state, and federal law enforcement and intelligence agencies in the investigation of domestic and global terrorist attacks? Why, or why not?

Categories
Applied Sciences homework help

Explain cultural competence for administrators who will act as advocates and policy makers.

Instructions
This week, you will prepare a white paper.  Explain cultural competence for administrators who will act as advocates and policy makers. Consider how social work administrators might apply their leadership roles to increase cultural competency and advance social and economic justice within their organizations. Address the following in your white paper:
Explain strategies social work administrators may use to become advocates for social change through cultural competence.
Determine the challenges administrators may face in developing cultural competency within their organizations. Provide examples to support your findings.
Recommend strategies administrators might use to address the challenges of developing the cultural competency of their organizations. Be sure to include strategies for performance difficulties and ethical concerns in your report.
Formulate potential policies administrators could implement to develop and maintain cultural competency in their organizations.
Support your assignment with at least three scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including seminal articles, may be included.
Length: 5-7 pages, not including title and reference pages

Categories
Applied Sciences homework help

Determine which approach you think best describes how the agency is managed and explain why.

For this assignment, you will apply the two leadership theories discussed this week to a human services organization of your choice.
This can be the same agency as the one that will be the focus of your Signature Assignment. Assume you have been asked to present during a training meeting for newly appointed leaders of this agency.
First, briefly describe the social service agency[1] with which you are familiar. Be sure to include the mission and goals of the agency, the population(s) it serves, and the organizational structure of the agency.
Apply either the path-goal or leader-member exchange theory to the agency. Determine which approach you think best describes how the agency is managed and explain why.
Explain whether this approach results in the best outcomes for the clients served. Recommend best practices to ensure ethical standards are upheld during client service delivery.
Incorporate appropriate animations, transitions, and graphics as well as speaker notes for each slide. The speaker notes may be comprised of brief paragraphs or bulleted lists and should cite material appropriately. Add audio to each slide using the Media section of the Insert tab in the top menu bar for each slide.
Support your presentation with at least three scholarly resources. In addition to these specified resources, other appropriate scholarly resources may be included.
Length: 12-15 slides (with a separate reference slide)
Notes Length: 100-150 words for each slide

Categories
Applied Sciences homework help

What role do statistics play in social work research?

Instructions
Imagine you are a member of the Society for Social Work and Research (SSWR), a professional organization for researchers in social work. In your own words, prepare a hypothetical blog post for the organization’s home page for other social work researchers to read and respond to. For your blog, analyze the questions below.
What role do statistics play in social work research? Do you believe they are simply superfluous (an unnecessary burden) or are they useful? On what do you base your opinion?
Some argue that outliers should be eliminated from results. Do you agree or disagree with this approach as it relates to advancing the science of social work? Why or why not? How do oppressed, marginalized, and vulnerable populations correspond to the notion of outliers?
Length of blog: 3-5 pages, not including title and reference pages. Support your blog with at least three scholarly sources.
Your blog must be effectively designed and meet the following criteria:
Contains text that is readable (e.g., appropriate size of font, type of font, contrasts with the background, contains sufficient white space),
Includes information within the blog that supports the assignment.
Ensures any included links are active and work.
Contains at least one graphic.
Uses the same template throughout the blog with a consistent design.
Your blog should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. Your submission should reflect scholarly writing and current APA standards where appropriate. Be sure to adhere to Northcentral University’s Academic Integrity Policy.

Categories
Applied Sciences homework help

What is a scalable clustering algorithm?

In chapter 8 we focus on cluster analysis.  Therefore, after reading the chapter answer the following questions:
What are the characteristics of data?
Compare the difference in each of the following clustering types: prototype-based, density-based, graph-based.
What is a scalable clustering algorithm?
How do you choose the right algorithm?
Requirements:
Students must not copy and post from sources.  When referencing sources, students must rephrase all work from author’s and include in-text citations and references in APA format.

Categories
Applied Sciences homework help

What are the characteristics of anomaly detection?

What are the characteristics of anomaly detection?
What are the detection problems and methods?
What are the statistical approaches when there is an anomaly found?
Compare and contrast proximity and clustering based approaches.

Categories
Applied Sciences homework help

How important is implementing corrective action techniques in maintaining an efficient SPC system?

Please see both attachments for guidance in completing the assignment and for the case study that the assignment is on.
Read the attached article then answer the following questions:
What observations about statistical process control can you make after reading the article?
How important is implementing corrective action techniques in maintaining an efficient SPC system?
One of the significant difficulties in advancing healthcare quality is the lack of specificity in defining healthcare processes, establishing performance standards, and measuring compliance with standards after they are defined. Explain how the use of SPC can help solve these issues.

Categories
Applied Sciences homework help

Why is it important to persist mobile application data into a database?

From the humdrum of the mid-2000s web apps, Apple radically changed the mobile world with the iPhone, offering well-designed apps of their own and curating apps that were accepted into the App Store.  That influence has been far reaching, prompting Google to push their boundaries and develop material design, a design language that has become the distinctive hallmark of Android apps.  When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?  Anytime you see data presented in a single-column format, whether it’s in the Settings app, the list of songs in the Music app, or the list of emails in the Mail app, those are examples of using a table which contains stored data being configured in different ways.
Why is it important to persist mobile application data into a database?
Discuss six (6) ways that data can persist in iOS
Why is navigation using tables an important aspect of mobile app development?
Discuss how navigation using tables in iOS is compared to Android (see Hand-out)