Threat Analysis Report
For the purposes of the Threat Analysis Report, students will assume the role of a Kentucky Intelligence Fusion Center (KIFC) strategic analyst and conduct a threat analysis on a potential threat to Kentucky. The following are examples and can be used.
•Kentucky Militia
•Ku Klux Klan
•Mara Salvatrucha MS-13
•Sinaloa (Mexican) Cartel
•Somali Gangs (Louisville area)
Threat Profile
Objective: Complete an in-depth profile on your selected threat group.
Instructions: Students will develop the initial phase of their Threat Analysis Report. This initial phase will include:
Title Page: Per APA
Introduction: One (1) page maximum. This section will overview the purpose, key questions, and key context of the report. Identify the topic and scope of your study and provide a short justification of why this study is important. Your research question is: What potential threat does (your threat) pose to (area or scenario of your report’s analysis)?
Threat Profile: Six (6) page minimum. The threat profile section provides detailed context and information about your selected threat group. Within the threat profile, the following elements must be discussed and utilized as section headings:
•Origins (including a discussion of the political, economic, or social conditions that caused this organization to form and motivate its behavior);
•Ideology;
•Goals and objectives;
•Organization and leadership;
•Funding or sources of support; and
•Capabilities (include discussions of, where appropriate, main physical bases or operating/support location(s), personnel strengths, training programs, communications methods, known weapons/lethal agents and delivery methods, suspected weapons/lethal agents and delivery methods, past activities, standard operating procedures from past attacks, propaganda programs, surveillance methods, and significant events/dates that may be used in attack planning).
References: A reference list must be included that contains a minimum of 10 trustworthy sources that were used/cited in preparation of the threat profile.