There is an expression often used by military historians that says, “Know thy enemy.” One reason to adhere to such an adage is that knowing your enemy’s philosophy, capabilities, habits, fears, strengths, and more allows one to better design appropriate defenses and preventative measures. This tenet is not always well-considered or remembered, however.
For this unit, you will think like an adversary of the United States. At the same time, you will consider and describe (or perhaps “invent”) technological concepts and constructs similar to those employed by the U.S. to include communication networks, fusion centers, a viable information sharing environment, and other technologies possibly used in creative ways. (An example is using a cell phone as a remote detonating device for an improvised explosive device (IED).) You may also describe technologies not known in current use, but these choices must have some citable basis in reality. Make such descriptions persuasive if you elect to use these.
Address the following in 4–6 pages:
Describe your selected entity—is it a cell, a terrorist network, a nation-state sponsoring terrorists, a conventional nation that opposes the U.S., or some other form?
Your selection and description may be hypothetical, based on real-world organizations or governments, or a combination of both. You are not limited to terrorist organizations or networks.
What are at least 5 main technological types and/or tools used by your selected entity with regard to information sharing and intelligence gathering? Explain.
Describe the adversary’s version of the following:
Information sharing environment (ISE)
Assuming your adversary is unconcerned with ethics, describe at least 3 of the unethical or immoral ways this enemy uses technology to attempt to attack or defeat the United States or its allies.
What are 3 unethical ways this entity or its sponsor employs the technologies against their nation’s own population? Explain in detail.
For all of these unethical acts, include details about the motives behind precise uses.
Lastly, having considered in detail the ethical violations involved in studying your enemy’s leveraging of technology, contemplate and discuss under what circumstances or justifiable cases the U.S. might employ similar methods;
Remember to defend your answers with evidence or critically derived arguments.
Note: You do not need to necessarily agree with the identified or invented unethical practices; describe them as potential motives, uses, or justifications as objectively as you can, avoiding inserting your opinion or emotion into your answer.
Be sure to reference all sources using APA style.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more