Vetting Strategy
The purpose of this report is to culminate the previous two assignments, using the source profile and subsequent vetting plan. This report will determine the reliability and usefulness of the previously discussed intelligence source. Taken from the perspective of a HUMINT officer, this report will include the issues revolving around the source and how to incorporate any possible information this source has to offer into describing the larger intelligence picture.
This report will include the necessary steps of a vetting plan that will minimize risk and maximize results.
Vetting Issues
The information presented about Allen Jones creates some important questions in terms of vetting him as a reliable source of information. Jones is a complicated figure with many emotional issues. He is well connected within the underground libertarian movement and is surrounded by many seemingly important sources of information. His family background suggests that his father's suicide after his career within the intelligence community is a large motivating factor for Allen's political activity.
Another important issue dealing with this case is the high profile personality that Jones displays. He is quite famous in some libertarian and political circles making him a focus point for...
His radio show and media outlet is home to many interesting and derisive theories regarding politics and news. Jones' emotional condition signifies that he is very suspect to events that trigger deep personal events.
2.Vetting Strategy
As a result of the intelligence failures experienced in the lead up to the Iraq war, new directives have been developed to shape vetting strategies. The White House released a Adjudicative Guidelines for Determining Eligibility for Access to Classified Information late in 2005 to highlight this strategic shift. In summary this directive gives guidelines that "apply to persons being considered for initial or continued eligibility for access to classified information."
These guidelines are designed to ensure that nuances of human nature are understood so as to recognize the value in maintaining a worthwhile relationship.
a. Conducting Vetting Actions
The first issue to determine is how much vetting is necessary in this case. There appear to be several different levels of sensitivity for information and access to all of these levels needs to be in accordance with a direct need to that access. In other words, this relationship should remain on a "need to know basis." The greater access…
References
Biographical Template on Allen Jones. Provided by student.
Pilkington, E. (2011). Curveball's admission raises questions about CIA. The Guardian UK, 15 Feb 2011. Retrieved from http://www.guardian.co.uk/world/2011/feb/16/curveball- questions-cia
Vetting Curveball Analysis. Provided by student.
White House Memorandum. Adjudicative Guidelines for Determining Eligibility for Access to Classified Information. 29 Dec 2005. Retrieved from http://www.fas.org/sgp/isoo/guidelines.pdf
P&G is looking to make the Supplier Environmental Sustainability Scorecard methodology a global standard (P&G, 2010). To support this effort to make the scorecard a global baseline of sustainability measurement, P&G freely distributes Microsoft Excel models of the methodology and baseline analysis tools from their website. The foundations of the methodology can be seen in Figure 2: Procter & Gamble's Supplier Environmental Sustainability Scorecard Methodology. The key metrics measured
eCRM Strategies One of the more interesting tools of analysis used when dealing with marketing, business, or consumer issues is moving the learning dynamic from rote and informational (more quantitative) to more qualitative. There were several aspects to the assignment on eCRM strategies that were both exciting and contributed to a more robust learning environment: Group Discussion -- teamwork was challenging because of different learning styles, but we discussed the various
66). Furthermore, social software will only increase in importance in helping organizations maintain and manage their domains of knowledge and information. When networks are enabled and flourish, their value to all users and to the organization increases as well. That increase in value is typically nonlinear, where some additions yield more than proportionate values to the organization (McCluskey and Korobow, 2009). Some of the key characteristics of social software applications
Burns (2007) indicates that the text is about that which motivates the actions and decisions of the entrepreneur, including the influence of personal social networks, family and personal background. Moreover, the text reports itself to be about the tasks of management which are associated with the entrepreneurial approach as well as how decisions are make, how risk is balanced and most essentially how there is a clear distinction between
Works Cited: Murray, G. (2008, January). The Case for Corporate Aviation. Risk Management, 55(1), p. 42. Sheehan, J. (2003). Business and Corporate Aviation Management: On Demand Air Transportation. New York: McGraw Hill. Suzuki, Y. (2000). The effect of airline positioning on profit. Transportation Journal, 39(3), 44-54. Toomey, J. (2010, March). Building Parner Aviation Capacity Through Training. DISAM Journal of International Security Assistance Management, 31(4), pp. 118-25. Transportation Security Administration. (2011, March). Air Cargo Security Programs. Retrieved
From this broader perspective and in their planning and operations they have changed the term 'stockholder' to 'stakeholder' to cover employees, customers, suppliers and the community at large. With the growing complexity and dynamism brought about in business, organizations understood they required more guidance to guarantee that their dealings aligned with the overall good and did not pose any harm to others and with this was born business ethics.