Surveillance

Identify potential online open sources that may be used by both the protection professional and the aggressor to perform intelligence assessments, and in the case of the protection professional, threat assessments. Provide an example (that has not already been posted by another student). Lastly, describe the components of the Design Basis Risk Management/Assessment Model. 

The post needs to be at least 400 words in APA format. Please use the link below for resources/sources and refer to Week 6.