Chapter 5 Questions
1. Describe the properties of strength, elasticity, plasticity, ductility, and brittleness.
The strength of a material is its ability to withstand externally applied forces without
failing. When a part can
What lessons did you learn from the Challenger accident? For instance, this accident
reminds one of the importance of being receptive to, even explicitly soliciting, the advice
of your advisors and subject matter experts. What other lessons are t
Discuss the various components of the United States intelligence community,
intelligence cycle, and the importance of the intelligence process to national security.
The US intelligence community, as a compartmentalized dispersion of interlocking
Describe what the processing of intelligence is and why it is an important part of the
The processing of intelligence is a procedure or series of steps taken to convert or decipher
collected information into an intelligence product. Th
Discuss the role technology plays in the collection of overt and open source intelligence.
Overt collections with open source intelligence (OSINT), arguably one of the most reliable
collection platforms available, but also time consuming in many efforts.
Discuss what dissemination of the intelligence product is and to whom it might be provided.
Give examples of final intelligence products.
The dissemination of intelligence products is a specific release of information collected and
analyzed to intentional
1. Commercial Security Threats - Select a crime or security threat of concern to a
security officer in the commercial sector and describe how the security officer might
prepare to mitigate the exposure to that specific vulnerability.
Theft is one of the h
National Counterterrorism Center
The National Counterterrorism Center (NCTC) is a pinnacle for National Security threat analysis
and production of threat summaries and information, namely associated with international
1. Evolution of Security - What was the evolution of security (how did security evolve for mankind)?
Security for mankind evolved in the four phases listed by Reith:
Individuals or small groups come together to seek collective security
The discovery by th
Discuss the possible new intelligence collection methods that may be used in the future.
Give examples of final intelligence products.
There are no reservations that cyber exploitations and collection methods will take the stage of
Discuss what covert assets and methods of collection could be employed to obtain
intelligence on your selected target for your course project as an intelligence case
The covert collection priorities of my target, the Glavnoye razvedyvatelnoye upr
1. Corporate Security Issues - Describe one issue a corporate security officer will face in
securing the privately held infrastructure of this nation, and explain some mitigation
techniques that a CSO might employ in their security practice to support you
Discuss the necessity of the use of secretive and deceptive methods in the collection of
intelligence and its relationship to ethics and the role of the congressional oversight
The integrity of many intelligence collections, especially covert and
Discuss the process of analyzing and producing a final intelligence product. Give examples
of final intelligence products.
The process of analyzing and producing intelligence products is dynamic in operation to
maintain pace with the fluid nature of intel
1. Violence - What are the potential causes of violence, and what characteristics are
common to violence at the workplace or in school?
The potential causes of violence are wide ranging and ever-increasing in classification and
significance to the actual
Locate an article (journal, news, or WWW) or a YouTube video that examines and
discusses a current example of intelligence planning and the identification of an
Although the Field Manual and Regulation designators are out of date, thi
1. CPTED - Explain the purpose of CPTED and how Basic Physical Security Equipment
can be used to maximize the return on investment (ROI) for the security cost center.
The purpose of the Crime Prevention through Environmental Design (CPTED) is to reduce th
1. Security Personnel Requirements - List the minimum standards for private security personnel and
recommend other requirements that you believe would be useful.
The minimum standards or criteria to hire security personnel are:
Minimum age of 18
1. Mitigating Crime Risks - Describe a crime of major importance to private security and
explain methods to mitigate that risk.
Larceny-theft is a crime of major importance to private security and is also one of the most
common crimes committed, especiall
1. Civil Offenses - What is the difference between Defamation, Libel, and Slander? Give
an example of each.
Defamation is injuring a persons reputation, such as by falsely inferring, by either words or
conduct, in front of a third disinterested party, tha
Chapter 14 Questions
1. Describe inergranular corrosion. Discuss cause, identification, removal and
Intergranular corrosion is a corrosion type that caused localized attack along the
grain boundaries, or immediately adjace
Aircraft Metals &
Their Heat Treatment
Heat treatments have three functions;
soften a metal,
harden a metal, and
can harden the surface of a metal while
leaving the interior almost unchanged.
These changes are
Assignment: Case Study Analysis: American Airlines Flight 191
Toh Zuan Yi
Chia Cheng Xi
Benjamin Han Wei Cong
American Airlines flight 191 is touted as the deadliest aviation accident to have
occurred in the United States. The flight