Week 1 assignment

Week 1 assignment.

I’m studying for my Law class and need an explanation.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now


In the wake of the terrorist attacks in September 2001, the 9/11 Commission recommended that the U.S. Intelligence Community (USIC) find a way to improve information sharing of terrorism-related intelligence at all three levels of government (local, state, and federal). The USIC’s answer to this recommendation was the creation of intelligence fusion centers.

Since the creation of these intelligence fusion centers, there has been much controversy because of the large amounts of personal information secretly collected and shared within the U.S. intelligence and law enforcement communities. In addition, some critics argue that in the years since their creation, fusion centers and the law enforcement entities affiliated with them have moved away from their original purpose and instead have utilized federal grants and resources to fight local crime.

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

  • In your opinion, how effective are U.S. fusion centers? Explain.
  • Do you feel that the creation of fusion centers has improved information sharing of terrorism-related information at all three levels of government? Why or why not?
  • Do you feel that fusion centers have ultimately moved away from their intended purpose? Why or why not?
  • Are fusion centers now being used as a local law enforcement tool to help fight local crime? Why or why not?


Counterintelligence Program (COINTELPRO)

Throughout history, counterintelligence has played a key role in U.S. national security. From 1956 to 1971, the FBI conducted a series of controversial and sometimes illegal domestic counterintelligence operations referred to as COINTELPRO (counterintelligence program). The ultimate goal of these FBI operations was to disrupt, discredit, and destroy certain political groups, civil rights groups, and radical organizations that potentially posed a threat to U.S. national security. This program was officially disbanded in the 1970s after a series of inquiries and investigations into the legality of the program. Some critics argue that the COINTEL program was disbanded in name only and that the FBI continues its controversial domestic counterintelligence operations to this day. Others argue that the COINTEL program was and is a necessary tool used by the FBI to protect U.S. national security.

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

  • What impact do you think COINTELPRO had on the evolution of U.S. counterintelligence? Explain.
    • What activities, if any, do you feel were the most shocking in terms of ethics and legality? Why?
    • What activities, if any, do you feel were completely necessary to ensure national security? Why?
  • Overall, do you feel that the controversial counterintelligence tactics used during COINTELPRO were necessary to protect U.S. national security.
  • Are there any circumstances where you feel this type of domestic counterintelligence should be allowed? Why or why not?
    • Your posting should be more than just opinion and should present a valid argument that is supported by factual information.
  • Individual Project 1

The National Counter-Terrorism Center (NCTC) was created based on the recommendation by the 9/11 Commission, in the wake of the terrorist attacks in September 2001, in an effort to eliminate duplication and create a more effective way to organize and evaluate terrorism-related intelligence. According to the Commission, the NCTC should be the center for joint operational planning and joint intelligence.

You are an FBI intelligence analyst assigned to the NCTC and have just received information from the FBI’s New York field office that a suspected terrorist will be traveling from New York City to Lahore, Pakistan sometime next week. The New York field office has also informed you that this individual may be meeting with other suspected terrorists in Pakistan to attend a terrorist training camp in the Northwest region of the country. The FBI received this information from a human intelligence (HUMINT) source with direct access to the reported information.

Assignment Guidelines

  • For this assignment, you must write a paper discussing how the NCTC will utilize the information received from the FBI to resolve this threat.
  • Address the following in 2-3 pages:
    • How does the NCTC function within the USIC? Explain.
      • How will the NCTC integrate this threat report into the USIC and draw on intelligence resources?
    • What is the process by which the NCTC would plan and coordinate joint intelligence operations to effectively combat terrorism? Explain.
      • Which law enforcement and intelligence partner organizations would NCTC plan and coordinate with to resolve this threat?
    • What is the NCTC’s role in leading strategic analysis, pooling all sources of intelligence, and developing assessments and warnings? Explain.
      • How will the NCTC utilize this information to provide warning and prevent future threats to U.S. national security?
  • Be sure to reference all sources using APA style.

Individual Project 2

You are an intelligence analyst for the Federal Bureau of Investigation (FBI) assigned to the Counterintelligence (CI) Division. The FBI’s CI Division has been involved in the field of CI for decades. During this period, the CI division has conducted thousands of CI investigations, many of which have had a major impact on the history and national security of the United States. It is important as an intelligence analyst with the CI Division to have a clear understanding of these cases and to learn from both its past CI successes and failures.

You have been asked by your supervisor to research major espionage cases to produce an intelligence assessment from a historical perspective that will help to recognize anomalies that might indicate the presence of espionage and assist in the neutralization process in the future.

Assignment Guidelines

  • For this assignment, you must write a counterintelligence case study, approximately 750–1,000 words in length, on one of the following major espionage cases:
    • Robert P. Hanssen
    • Aldrich H. Ames
    • Ana B. Montes
    • John A. Walker
  • For your selected case study, you will address the following in detail:
    • Who
      • What was this person’s personal background?
      • What was this person’s professional background?
      • Were there any accomplices? If so, explain.
      • Which foreign powers were involved?
    • When
      • When did the espionage begin?
      • For how long did the espionage continue?
      • When was the spy apprehended?
    • Where
      • Where did the espionage take place?
        • Consider military intelligence, U.S. soil, agency/rank, and so on.
    • What
      • What information was being leaked?
      • For what purposes could that information have been used?
    • How
      • How was the information taken from U.S. facilities or databases? Explain in detail.
      • How was the information delivered to the foreign power or powers? Explain.
      • How was the spy apprehended? Explain.
    • Why
      • What was the motivation for the espionage? Explain.
    • Answer the following questions as well:
      • What lessons were learned after the selected case concluded?
      • What impact did this particular case have on U.S. policies and operational standards?
        • Consider successful and unsuccessful investigative techniques, implications, and recommendations.
  • Compile your responses in your final case study, and submit the file to your instructor.
  • All sources must be referenced using APA style.

Week 1 assignment