Study Document
intelligence Thesis Proposal
Abstract
This proposal describes the need for an ethical standard in intelligence. It discusses how an analysis of the formation of the intelligence program under Angleton can provide insight into what went wrong with intelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to … can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of intelligence in the 1950s, 1960s, and 1970s. The research design is qualitative with the case study approach to Angleton’s intelligence serving as the method. The aim of the research is to provide an ethical framework that could be used to help the intelligence enterprise collaborate more effectively with the private sector in the future.
Introduction
intelligence and intelligence operations have always been a part of……
Reference List
Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.
Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.
Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.
Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf
Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.
Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.
Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020. https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html
Study Document
...Central intelligence agency Entering the Brazilian Market
Problem Statement
Peak must decide on a pricing strategy for entering the Brazilian market. It has narrowed its options down to three: penetration pricing, skim pricing and cost-plus pricing. This report will evaluate the company, the market and each of these three options in order to determine the best choice of pricing strategy when entering the Brazilian market.
Concept/Theory: SWOT Analysis
The SWOT analysis is a tool whereby the company analyzes its internal strengths and weaknesses, and its external threats and opportunities, in order to provide some context for the decision that it is facing. The strategy that the company chooses should in some way reflect either leveraging strengths to take advantage of opportunities or to shore up weaknesses in order to defend against threats. In this case, where the company is determining a strategy for entering a new market, it will probably take into account……
References
Chappelow, J. (2019) Monopolistic competition. Investopedia. Retrieved March 28, 2020 from https://www.investopedia.com/terms/m/monopolisticmarket.asp
CIA World Factbook. (2020) Brazil. Central Intelligence Agency. Retrieved March 28, 2020 from https://www.cia.gov/library/publications/the-world-factbook/geos/br.html
Decker, A. (2020) The ultimate guide to pricing strategies HubSpot. Retrieved March 28, 2020 from https://blog.hubspot.com/sales/pricing-strategy
Dourado, A., Canabrava, L, Spadano, L, Alvarenga, P., Salles, R., Advogados, F., Lourencao, M. & Trung, T. (2019) Doing business in Brazil: An overview. Thomson Reuters Practical Law. Retrieved March 28, 2020 from https://uk.practicallaw.thomsonreuters.com/0-503-8385?__lrTS=20180603124715781&transitionType=Default&contextData= (sc.Default)&firstPage=true&bhcp=1#co_anchor_a102539
Downey, L. (2019) Brazilian real. Investopedia. Retrieved March 28, 2020 from https://www.investopedia.com/terms/forex/a/brl-brazilian-real.asp
Furgison, L. (2019) SWOT analysis, step 5: developing actionable strategies. BPlans.com. Retrieved March 28, 2020 from https://articles.bplans.com/swot-analysis-challenge-day-5-turning-swot-analysis-actionable-strategies/
Kokemuller, N. (2020) Entry pricing strategy. Houston Chronicle. Retrieved March 28, 2020 from https://smallbusiness.chron.com/entry-pricing-strategy-61428.html
Riley, C. (2019) Jair Bolsinaro says Brazil is open for business. CNN Business. Retrieved March 28, 2020 from https://www.cnn.com/2019/01/22/business/bolsonaro-brazil-davos-foreign-investment/index.html
Study Document
...Central intelligence agency Global Marketing Project
Market Analysis
St. Lucia is a small market, with a population of 166,000 people and a GDP per capita of $14,400 (CIA World Factbook, 2020). This makes it a relatively weak market for fast food, and there are only a few outlets in the entire country, and none for McDonalds. There is potential, however, in Castries, and in tourist areas such as Rodney Bay, or near the airport in Vieux Fort. How much potential the market had is up for debate, as locals do not eat much beef, and this was responsible for the downfall of McDonalds in Barbados and Jamaica recently (Patrick, 2020). Furthermore, the pandemic has suppressed demand for all restaurants in St. Lucia. Other outlets like KFC have barely a foothold in the country. That said, McDonalds is motivated to figure out the Caribbean market, because there is opportunity if it can figure out……
References
CIA World Factbook (2020) St. Lucia. Central Intelligence Agency. Retrieved May 29, 2020 from https://www.cia.gov/library/publications/the-world-factbook/geos/st.html
Deloitte (2020) International tax St. Lucia highlights 2020. Deloitte. Retrieved May 29, 2020 from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Tax/dttl-tax-stluciahighlights-2020.pdf
Duncan, N. (2019) The QSR 50. Quick Service Restaurants. Retrieved May 29, 2020 from https://www.qsrmagazine.com/reports/qsr-50-11
Patrick (2020) McDonald’s failure in Barbados hides in plain sight. Uncommon Caribbean. Retrieved May 29, 2020 from https://www.uncommoncaribbean.com/barbados/mcdonalds-failure-in-barbados-hides-in-plain-sight/
St. Lucia Times (2019) Saint Lucia slips in ease of doing business rankings. St. Lucia Times. Retrieved May 29, 2020 from https://stluciatimes.com/saint-lucia-slips-in-ease-of-doing-business-rankings/
Trading Economics (2019) St. Lucia corruption perceptions index. Trading Economics. Retrieved May 29, 2020 from https://tradingeconomics.com/st-lucia/corruption-index
Study Document
Why Ethical Egoism is a Problematic Framework for intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in intelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). … and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US intelligence enterprise support collaboration among the various USIC members and the private sector in an ethical and productive manner? The ultimate purpose of this … sector in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the intelligence program as it works to collaborate with the private sector in the 21st century. Therefore, the themes this review will examine are: 1)……
Bibliography
2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center
Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.
Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.
Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.
Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.
Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.
Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.
Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.
Study Document
Morality of intelligence Ethical Implications and the Need for a Theoretical Framework
CI Literature Review
Deception is at the core of intelligence: yet, it is a problematic core because of the corruption associated with deception in ethical systems. Mattox (2002), for example, observed that the … observed that the practice of deception “is subject to limitations imposed by the demands of morality” (4). Unfortunately, morality within the realm of intelligence is often the first casualty, as history shows (Valentine 2016). The official beginnings of intelligence under the leadership of James Jesus Angleton have illustrated the extent to which the art of deception can create problems within the intelligence community (Morley 2017, 69). Within this community itself there is no standard ethical framework applied (Bailey and Galich 2012, 77). In intelligence, there is even less emphasis on ethical cohesion; as Valentine (2016) has revealed, the history of US intelligence is fraught……
Bibliography
2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center
Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.
Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.
Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.
Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.
Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.
Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.
Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.
Study Document
… help bring survivors of the attack back to the surface where they can be treated.
The resources the National…[break]…operations can be conducted and intelligence and law enforcement shared and coordinated (Pate et al., 2007). Interagency operation centers are crucial to the provision of real-time security. This can be seen at the Port of Charleston, San Diego, the Port … and time again to be up for the task of responding to disasters. It showed it during Hurricane Katrina, and was the only agency to really have a true “spirit of mission” according to Samaan and Verneuil (2009).
Additional DHS agencies that CG-2 coordinates with include FEMA, … to Samaan and Verneuil (2009).
Additional DHS agencies that CG-2 coordinates with include FEMA, U.S. Customs and Border Protection, the Cybersecurity and Infrastructure Agency, the U.S. Citizenship & Immigration Services, U.S. Immigrations and Customs Enforcement, U.S. Secret Service and the Transportation Security……
References
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Christenson, G. (2015). CBRN response. National Guard Bureau.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat
Jennings, P. (2006). Miami port poses serious risks. Retrieved from https://abcnews.go.com/WNT/story?id=131634&page=1
Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from http://www.johnstonsarchive.net/terrorism/chembioattacks.html
Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.
Maras, M-H. (2014). Transnational Security. Florida: CRC Press.
We have over 150,000+ study documents to help you.
Sign Up for FREE