Posts

Showing posts from November, 2023

MOD 7: Intelligence Value

Image
            Placing a value on intelligence can be a complicated task that has many layers to it. Factors that impact this include the source, source reliability, relevance, time the information was gathered, accuracy, biases, and usability.         To begin analyzing the gathered intelligence, you have to first determine what was the source? Is it a photograph, a collection of data, information passed on from an individual? An image with a collection of data is arguably more reliable than word of mouth coming forming someone passing on information. This leads us to source reliability. This factor will guide us to should we trust the information collected. Once again, a photograph with data would be considered more reliable than a person. A person may not have all the facts that contribute to quality intelligence and could also be influenced to pass on information that is not reliable.      The nex...

Director of National Intelligence Cycle Method VS Target Centric Method

Image
      After reviewing the assigned methods, the two that stuck out the most to me were the director of national intelligence cycle method and target centric method. After review, they contrast in a few different areas that reflects how they differently use the intelligence.      The director of national intelligence cycle method includes a detailed process of collecting and controlling information. It includes the following steps; collection, processing, analysis, dissemination, planning, and evaluation. The graphic below details the processes cycle and how it continuously works. This method follows through those steps as listed, collecting and controlling the intelligence throughout it, and at the end, they evaluate how to best utilize the intelligence.      This defers from the target centric approach. The target centric method uses F3EA, which stands for find, fix, finish, exploit, and analyze. This was used by General Stanley A....

Democratic People's Republic of Korea

Image
      North Korea has been continuously expanding it's military capabilities as well as increasing their public appearance positively and stronger as a nation. By doing so, their goal is to make themselves appear to be a potential threat and to be a secure nation like the Unite States. This has been captured by the NSA as they have continuously tracked the propaganda and malware to influence other countries peoples, socially engineering them to achieve their goals. This expansion of their propaganda has caused the NSA, working with multiple other agencies, to put out a notice or warning to the people of their actions.      On June 1st, 2023 the NSA published a Cybersecurity Advisory (CSA) warning people of the possibility that North Korea maybe attempting to hack think tanks, academics, and news outlets. To accomplish this, they pose as individuals that are looking to participate with them  and influence the...