There is an expression often used by military historians that says, “Know thy enemy.”

There is an expression often used by military historians that says, “Know thy enemy.” One reason to adhere to such an adage is that knowing your enemy’s philosophy, capabilities, habits, fears, strengths, and more allows one to better design appropriate defenses and preventative measures. This tenet is not always well-considered or remembered, however. 

For this unit, you will think like an adversary of the United States. At the same time, you will consider and describe (or perhaps “invent”) technological concepts and constructs similar to those employed by the U.S. to include communication networks, fusion centers, a viable information sharing environment, and other technologies possibly used in creative ways. (An example is using a cell phone as a remote detonating device for an improvised explosive device (IED).) You may also describe technologies not known in current use, but these choices must have some citable basis in reality. Make such descriptions persuasive if you elect to use these.

Assignment Guidelines

  • Address the following in 4–6 pages: 
    • Describe your selected entity—is it a cell, a terrorist network, a nation-state sponsoring terrorists, a conventional nation that opposes the U.S., or some other form? 
      • Your selection and description may be hypothetical, based on real-world organizations or governments, or a combination of both. You are not limited to terrorist organizations or networks. 
    • What are at least 5 main technological types and/or tools used by your selected entity with regard to information sharing and intelligence gathering? Explain. 
    • Describe the adversary’s version of the following: 
      • Communications networks 
      • Fusion centers 
      • Information sharing environment (ISE) 
      • Detection tools 
      • Surveillance capabilities 
    • Assuming your adversary is unconcerned with ethics, describe at least 3 of the unethical or immoral ways this enemy uses technology to attempt to attack or defeat the United States or its allies. 
    • What are 3 unethical ways this entity or its sponsor employs the technologies against their nation’s own population? Explain in detail. 
      • For all of these unethical acts, include details about the motives behind precise uses. 
    • Lastly, having considered in detail the ethical violations involved in studying your enemy’s leveraging of technology, contemplate and discuss under what circumstances or justifiable cases the U.S. might employ similar methods; 
      • Remember to defend your answers with evidence or critically derived arguments. 
  • Note: You do not need to necessarily agree with the identified or invented unethical practices; describe them as potential motives, uses, or justifications as objectively as you can, avoiding inserting your opinion or emotion into your answer. 
  • Be sure to reference all sources using APA style
Psychological and dimensions of terrorism

The U.S. Department of State publishes a list of foreign terrorist organizations. Because of this label, many Americans lack the understanding of what these groups are trying to accomplish. You will hear broad, media-fed statements like, “They want us to live in the Stone Age,” or “They are opposed to our (Western) way of life.” Although these statements may contain some truth, they very often do not fully define what these groups are trying to accomplish. Without this information, how can the government effectively combat these groups’ actions? The reality is that they cannot. The misconceptions are not limited to the general public; many in government are also guided in some cases by them. 

In this assignment you will select one of the individuals from each of the following lists – one pre-WWII terrorist or mass killer and one modern day terrorist or mass killer – and you will compare and contrast these two individuals in terms of profile, background, education, and techniques used.

Pre-WWII Terrorists/Mass Killers

  • Maximilien Robespierre 
  • John Brown (abolitionist) 
  • Gavrilo Princip 

Modern Day Terrorists/Mass Killers

  • Eric Harris and Dylan Klebold 
  • Timothy McVeigh 
  • Umar Farouk Abdulmutallab 
  • Ted Kaczynski 
  • Anwar al-Awlaki 

Assignment Guidelines

  • In 8–10 pages, address the following for the 2 individuals that you have selected: 
    • A biography of the selected individuals. 
    • Goals (defined between political and ideological) 
    • Motivations 
    • Terrorist organization association 
    • Area(s) of operation 
    • Methods of engagement 
    • Legitimate functions (political, social, etc.) 
    • Psychological and cultural makeup 
  • For this assignment, you must utilize 4–6 scholarly sources. 
  • Compile your responses into your final paper, and submit the file to your instructor. 
  • All sources must be referenced using APA style.
Legal Protections for E-commerce

Legal Protections for E-commerce

In this assignment you’ll examine the legal protections for e-commerce. From the readings or from your own research, choose three U.S. laws that regulate the use of the internet for commercial purposes. You can choose laws that protect the consumer, the provider, or both. In your discussion, also include the issue of jurisdiction when conducting e-commerce transactions.

In a well-written paper, provide an overview of each law and what it’s meant to prevent or protect. Based on what you’ve learned so far in the course, propose at least two legal or technological solutions that might enhance the transaction of business via the internet.

Your paper should be well written

If you were a criminal defendant, would you prefer to have your case decided by a judge or a jury?

THE QUESTION(s): If you were a criminal defendant, would you prefer to have your case decided by a judge or a jury?Give reasons for your answer? 

(Make sure that your post includes your reasoning for your decision. Explain which facts helped you to reach your conclusion and how they influenced your choice of one over the other.  

  1. Complete post which provides an answer to the question(s) or prompt(s) using standard English vocabulary and grammar: 80% (250 word minimum).
  2. Complete response using proper format, standard English vocabulary and grammar: 20% (150 word minimum).
Write an interoffice memo to the executive team of Phoenix Advertising
  • Type of paperEssay (Any Type)
  • SubjectLiterature
  • Number of pages2
  • Format of citationOther
  • Number of cited resources0
  • Type of serviceWriting

Write an interoffice memo to the executive team of Phoenix Advertising Write a business letter to the social media director of Phoenix advertising. If necessary, brainstorm further. Draw on your own experience reading reviews and other online content. Write a business letter to the social media director of Phoenix advertising. If necessary, brainstorm further. Draw on your own experience reading reviews and other online content.

Create an informational presentation that can be shared with parents and other teachers to facilitate the application of student-led conferences.

This week you learned about student-led conferences as a way to empower learners and provide them the opportunity to have more ownership of their learning. Create an informational presentation that can be shared with parents and other teachers to facilitate the application of student-led conferences. Be sure to include APA formatted in-text citations and a reference list within your presentation. You can use PowerPoint, Google Slides, Prezi, etc. but if you use an online platform, make sure to submit a shareable link. Your presentation should be between 7-10 slides.

Design a secure software structure

This assignment is aimed to let you practice Security and Trust in Software Architecture design. Assume we are developing a management system for a library system. In this system, users can borrow and return books, managers can add and delete books from the system. Your work is to use the UML class diagram to design a role-based access control for this system. 

(1) Design the framework and draw the structure by using the UML class diagram . The designed framework should include at least three objects: book, user, manager.

(2) Based on the diagram, write no less than 200 words to explain how your designed structure conforms to at least three security principles for computer security. 

(3) The structure should demonstrate how access control is managed. Based on the diagram, please write no less than 100 words to explain how access control works.