A satisfactory report will include a:
· summary of the techniques used to gather actionable threat intelligence.
· visual representation of the information extracted from chapter readings
· discussion of the strengths and weaknesses of open sources as a basis for intelligence information and analysis.
· proactive solution to combat active and emerging threat actors and improve security posture
· concepts of current and future operations within remote sensing and commercial imagery.
· The chapters attached may be used as sources and the information may be incorporated in the paper as well
· The mid-term paper attached may also be used to build on this final paper
· Utilize APA citation format
· USE ONLY ACADEMIC ARTICLES/ JOURNAL ARTICLES