Insider Threats Analysis/Penetration Analysis
Insider Threats Analysis/Penetration AnalysisInsider Threat and Penetration of Hostile Intelligence Operations
View Full Description and Attachment(s)
In Week 6 you will have the option to address one of two topics. The first is insider threat analysis and the other is the threat presented by hostile intelligence operations. Also, you are required to respond to more than 3 other student postings. Don’t forget to be challenging and show what you know. Challenge, reflect, add new information, new perspectives, etc.
Topic 1
Insider threats come from individuals who operate inside friendly intelligence and national security organizations who purposefully set out to cause disruption, destruction, and commit crimes to those ends. Please read Insider Threat IPT and Solving Insider Threat in the Course Materials Folder. Using the web or the online library choose a high profile case of insider threat (cyber, intelligence, military) and draft a 350 word summary of the case highlighting successes or failures of analysis in bringing resolution to the case. What analysis methods can you discern? What do think could have been done differently to improve the analysis?
–or–
Topic 2
Complete reading Foreign Espionage Threat andObservations on the Double Agent and Social Courtesy. In the penetration of a hostile intelligence service analysis is central to identifying, pursuing, and preparing the recruitment of an agent. In 350 words please research the Oleg Penkovsky, Aldritch Ames, or Jonathan Pollard cases. Provide a summary of the role of analysis in the recruitment and running of these agents from the perspective of their handlers (the US/British, Soviet Union, and Israel, respectively). You’ll need to conduct additional research on the web or in the online library to help you develop a factual understanding of the case you choose.
Suggested Reading for the week (but not required):Predictive Intelligence in the Course Materials folder.
If you have any questions please ask!
Instructions: Your initial post should be at least 350 words for each question. Please respond to at least 3 other students. Responses should be a minimum of 250 words each. Ensure that you use the Chicago format to cite your sources.
Initial Post Due: Thursday, by 11:55pm ET
Responses Due: Sunday, by 11:55pm ET
Grading will be based on the following criteria:
50 – Initial Discussion Posting – Your original posting/response shows a clear understanding of the concepts presented by providing evidence from the assigned literature (with attribution). The initial posting is thought provoking and on topic. Timely posting of your original response to the Forum.
50 – Responses to Discussion Posts of Other Participants – You responded to more than 3 or more classmates by the due date and each advances the learning by including at least two of the following components: (1) Validates post with additional evidence from the literature (2) Poses a thoughtful question (3) Provides an alternative point-of-view (4) Offers additional insight into how the concept might be understood. Generally two-three full paragraphs per response. Your responses demonstrate careful analysis of your classmate’s opinions, and incorporate several terms, concepts, or theories from the required readings. Timely engagement with your classmates on the Forum. (See Forum Rubric)
![]() |
CIIACPredictiveIntelligence.docx |
![]() |
Foreign Espionage Threat.pdf |
![]() |
SocialCourtesy.pdf |
![]() |
ObservationsontheDoubleAgent.pdf |
![]() |
SolvingInsiderThreat.pdf |
![]() |
InsiderThreatIPT.pdf |
