


In Processing of Scholarship Awardees
In Processing of Scholarship awardees
Scholarship awardee receives notification of their acceptance to the program
Scholarship awardee receives their personal scholarship package. Said personal scholarship package to include:
Personalized business cards
Personalized executive binder
Personalized executive briefcase
Personalized laptop
Personalized / secure cell - phone[i]
Personalized radio frequency identification protected cell phone / credit card / identity card container
Scholarship awardee attends the scholarship awardee / acceptance dinner event
Scholarship awardee attends orientation process (scheduled on the day following awardee acceptance dinner) that outlines
The history / origins of the institution
The mission statement / mission goals of the institution
The principles the institution observes
The schedules of regular institutional events
Strategic partnerships the institute has with other organizations
Internships offered during summer months
Scholarship awardee scheduled meeting with an image consultant [ii]
Scholarship awardee meets with tailor to get custom tailored suits made, pursuant to image consultant’s guidelines
Scholarship awardee undergoes a initial assessment with a medical doctor / general practitioner (Doctor Kumar) to outline / document any specific health needs of the scholarship awardee
Scholarship awardee meets with a nutritionist to set up personalized dietary regimen conducive to supporting cognitive development
[iii]
Scholarship awardee attendance of scheduled seminar by an individual identity protection specialist [iv]
Scholarship awardee undergoes pre scholarship training – optimally completed in the summer before the applicants first semester
Competitive Cognition
Case Studies in Counterintelligence Operations[v]
Counterintelligence in a Democratic Society [vi]
Spies, Subversion, Terrorism and Influence Operations [vii]
Political Warfare: Past, Present and Future [viii]
Foreign Propaganda, Perceptions and Policy [ix]
_______________________________________
[i] http://www.androidauthority.com/u-s-army-to-use-secure-android-devices-soon-33588/ / http://www.geek.com/articles/mobile/boeing-to-launch-its-own-secure-android-smartphone-20120413/
[ii] http://www.aici.org/directory/default.aspx / http://newleafimageconsulting.com/corporate.html / http://www.professionalimagedress.com/
[iii] http://www.nap.edu/openbook.php?record_id=5827&page=519 / http://www.ncbi.nlm.nih.gov/pubmed/12798782 / http://www.nutrition-neuroscience.co.uk/publications/david_kennedy/all/all/publications/asc / http://www.cspo.org/documents/FinalEnhancedCognitionReport.pdf / http://www.military.com/features/0,15240,160921,00.html / http://archive.darpa.mil/DARPATech2002/presentations/ipto_pdf/speeches/SCHMORRO.pdf
[iv] http://5identitytheftprotection.com
[v] http://www.iwp.edu/programs/course/case-studies-in-counterintelligence-operations
[vi] http://www.iwp.edu/programs/course/counterintelligence-in-a-democratic-society-2
[vii] http://www.iwp.edu/programs/course/spies-subversion-terrorism-and-influence-operations
[viii] http://www.iwp.edu/programs/course/political-warfare-past-present-and-future
[ix] http://www.iwp.edu/programs/course/foreign-propaganda-perceptions-and-policy