intelligence threats to the U.S

In M3 Assignment 1, you conducted research on intelligence threats to the U.S., with a focus on state actors. In this assignment, you will research nonstate actors. Nonstate actors are groups with motivations not tied to a government. Their loyalties may be motivated by group ties or affiliations (such as in the case of Hamas and al-Qaeda), personal feelings of revenge, or other nonstate-related reasons.

In this assignment, you will take the time to examine nonstate actors and their methods. Through this assignment, you will gain an awareness of the motivations and methods of non-government sponsored actors to collect information against the U.S.

Tasks:

Using at least two scholarly resources from the professional literature, research some of the major intelligence threats to the U.S., focusing on nonstate actors. The literature may include the University online library resources; relevant textbooks; peer-reviewed journal articles; and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).

You will probably find that there is less research material available on nonstate actors.

In a minimum of 300 words, respond to the following:

  • What are some of the major intelligence threats to the U.S. and their means to ascertain their goals? Focus on nonstate actors.
  • Who are nonstate actors? Briefly describe them and give examples.
  • What are their general methods of operations? Explain with examples.
  • Assaults by which of the nonstate-sponsored (nonstate actor) foreign intelligence services (FISs) on the United States Intelligence Community (USIC) appear to have caused the greatest damage, either through the loss of resources, failed missions, or the loss of lives?
  • What were your greatest challenges in finding information on nonstate actor assaults?

Assessment of Cardiac Status

Assessment of Cardiac Status

Esther Jackson is a 56-year-old black female who is 1-day post-op following a left radical mastectomy. During morning rounds, the off-going nurse shares with you during bedside report that the patient has been experiencing increased discomfort in her back throughout the night and has required frequent help with repositioning. She states that the patient was medicated for pain approximately 2 hours ago but is voicing little relief and states that you might want to mention that to the doctor when he rounds later this morning. With the patient appearing to be in no visible distress, you proceed on to the next patient’s room for report.

Approximately 1 hour later, you return to Ms. Jackson’s room with her morning pills and find her slumped over the bedside stand in tears. The patient states, “I don’t know what is wrong, I don’t feel right. My back hurts and I’m just so tired. What is wrong with me?” The patient refuses to take her medications at this time stating that she is starting to feel sick to her stomach.click here to have your essay done 

Just then the nursing assistant comes into the patient’s room to record Ms. Jackson’s vital signs, you take this opportunity to quickly research the patient’s medication record to determine if she has a medication ordered for nausea. Upon return, the nursing assistant hands you the following vital signs: T 37, R 18, and BP 132/54, but states she couldn’t get the patient’s pulse because “it is all over the place.”

Please address the following questions related to the scenario.

1. What do you suspect is the cause of the patient’s symptoms?

2. Describe the course of action that you will take to confirm this suspicion and prevent further decline.

3. What further assessments, lab values, and tests will likely be ordered for this patient and how often? If testing is to be completed more than once, please explain the rationale for doing so.

4. While you are caring for this patient, how will you ensure that the needs of your other patients are being met?click here to have your essay done 

Calculating Default Risk Premium

Calculating Default Risk Premium

A particular security’s equilibrium rate of return is 8 percent. For all securities, the inflation risk premium is 1.75 percent and the real interest rate is 3.5 percent.

The security’s liquidity risk premium is .25 percent and maturity risk premium is .85 percent.

The security has no special covenants. Calculate the security’s default risk premium.click here to have your essay done 

leadership

Recently leadership development has been fine-tuned to address transition points as leaders move from individual contributor to front-line leader (supervisor), from front-line leader to manager of front-leaders, from manager to department/division head, from department head to director (junior executive), from director to executive, from executive to senior executive. Consider the kinds of leadership development discussed in the text and the learning theories discussed. Based on that information is this move to learning focused on audience-specific situations appropriate? Why or why not? Cite examples and research.click here to have your essay done 

Health Care Essay: Cost, Access, and Quality

Health Care Essay: Cost, Access, and Quality

An understanding of health care cost, access to care, and quality of care is vital for health care professionals, as is the ability to articulate these issues. For this assignment, students will examine the effects of cost and the issues associated with accessing quality care, both in a historical context as well as the future impact on health care. For this assignment, address the following in 750-1,000 word paper:

  1. Identify the factors contributing to the rising cost of health care. When did rising health care costs become an issue? Why are health care costs continuing to rise? What can be done to address this issue?
  2. Identify the impact that cost is having on access to care. How does access to health care today compare to 10 years ago? Can providers refuse care to those with certain payment methods such as Medicaid? Do you believe that we will have universal access to health care in the future?
  3. Discuss the issue of providing quality care. How much of a factor is cost in determining quality of care? What does the future of health care look like with regard to quality?

Two references (minimum) in addition to your textbook are required for this assignment.

Remember that this word count does not include your title page or reference page.click here to have your essay done 

technology

technology

Part 1: Short Answer. Answers should be no longer than a few sentences. “Bulletized” lists or small tables may be used for the sake of brevity. (4 points each; partial credit may be given if work is clearly shown)

1. Give a specific example of how inference control might be implemented in a database.

2. For a public-key encryption system (such as PGP), list some reasons for and against using the same key pair for both encryption and signature.

3. Compare and contrast PKI and Kerberos.

4. PKI has not been widely successful, partly because users don’t trust digital signatures. Give some reasons for that distrust.

5. Suggest some ways to address the “crypto dilemma,” along with the pros and cons of each.

6. A 1,000-bit message is used to generate a 512-bit hash. One the average, how many other messages could be expected to generate the same hash value? What does this tell us about the length of a hash as compared to the length of the message?

7. The following questions are worth 2 points each:click here to have your essay done 

The Importance of Merit

The Importance of Merit

Why are we so big on the concept of merit?

To be sure, merit is often determined by opportunities – it easier to get better grades if you are rich and have tutors.

It would appear to be a biased concept to begin with. But why are we so into the concept to begin with? Is there value to a merit based system?

Should we reward people who contribute or is there value in making sure everyone receives equal rewards regardless of their contribution?click here to have your essay done 

Contemporary Issues and Methods: Anonymous

Contemporary Issues and Methods: Anonymous

RA 2: Contemporary Issues and Methods: Anonymous

In today’s world, technology must be considered when examining the psychology of espionage. Additionally, societal response is a key in understanding the impact of these acts. In this assignment, you will have the opportunity to analyze the relationship between cyber activity compromising national security information and the social media response.

The government organization for which you work has taken notice of the actions of a group named “Anonymous” against the Church of Scientology, among others. In order to better prepare, your organization wants you to analyze, from a forensic psychological perspective, a potentially significant compromise of national security information via a cyber attack. You have been instructed to use the attack on Scientology, the HBGary attack, or other significant cyber attacks credited to Anonymous as your basis of comparison.

Tasks:

Using the Argosy University online library resources and other reputable, valid sources, research the group Anonymous and its cyber-hacking activities, paying particular attention to the actions against the group’s methods. Use your interrogatories (who, what, where, when, how, and why) to guide your research.

Write a 10- to 12-page report that analyzes the impact this group has (or may have) on the U.S. (societal impact, including economic and infrastructure), corporate America (business impact), and the government (political impact).

In your report, address the following:

  • Provide a synopsis of the group’s methods, goals, and activities. Make sure you address its actions against its target as well as its overall activities, goals, and methods. Also, include an explanation of the group’s members and its makeup (e.g., the demographics and characteristics of the group members).
  • Discuss motivations and possible explanations for the group’s behavior. Identify the psychological constructs and processes and explain the group’s actions. For example, describe what types of social psychological constructs reinforce its membership. Social psychology research on group dynamics will help in this explanation.
  • Analyze the impact of a potential attack on the US government. At minimum, address the following:
    • How vulnerable is the US government to a potential cyber attack?
    • What parts of the IC are most affected by a potential cyber attack on US systems? Why?
  • Analyze the impact of a potential attack on society. At minimum, address the following:
    • What role would the social media play in future incidents of espionage and counterintelligence (CI) activities?
    • What would be society’s response to the attack? Would society be supportive or nonsupportive? How would it be divided? Justify your answers.
    • What would be the real and intangible consequences of Anonymous’s hacking activities? What would be the positive and negative impacts of its actions on society? Overall, would society benefit from or be hurt by such actions? Justify your answers.
  • Summarize key points and provide a conclusion, based on your analysis, of what can be done in the IC to avoid future compromises.

Note: Make sure you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation. Include citations in the text and at the end of the document in correct APA format.

RA 2 is worth 300 points and will be graded according to the following rubric:click here to have your essay done 

essay

essay

The end of the fiscal year has come around. Your Chief Learning Officer has asked that you compile an evaluation of the L&D department’s efforts and recommendations for next year’s major initiatives. How will you go about this? What data will you look for and analyze? What key points will you want to make?click here to have your essay done