Verified Document

911 Commission Report Intelligence And Information Sharing Essay

Related Topics:

Intelligence, Information Sharing, and the 9/11 Commission Report Intelligence versus information

There two terms are fundamentally different for a number of reasons. The reason the terms are different can be decoded by investigating the ‘why’ from the information gathered. According to Lance (2017) the ‘how’ or ‘what’ is not important in decoding intelligence information. The resource needed to produce valued and true intelligence is by understanding why. The sole purpose any entity receives finished intelligence is to make it possible for the entity to make strategic, operational and tactical decisions with the information received. The media takes information received and takes steps towards transforming this information into stories hence creating actionable intelligence. In essence, according to Lance (2017) intelligence changes the how and what in information into when and why in the process of decision making. Information only becomes finished intelligence through detailed analysis of that information.

Tallmadge (2016) defines information as knowledge that is communicated concerning a circumstance or particular fact. On intelligence, Tallmadge (2016) defines it as the process of seeking information, determining what that information means, and following this up by using the information to take strategic action. Information is available everywhere from sources such as newspapers, daily news, blogs, one on one conversations etc. Intelligence on the other hand often details the information that is not necessarily readily and freely available. Intelligence information may not be found within public domains (Tallmadge, 2016). Intelligence as perceived by the public is privileged information which is intended to be consumed by specific audiences (Mostly security officials). Intelligence is an art of gathering the protected and privileged information and using it to the benefit of the public.

From the perspective of Goldfarb (2016), the principle difference between intelligence and information is data. Data does not have any context by itself. It would not be helpful to anyone in trying to solve a particular problem. In determining the difference between data and intelligence context is very important. Some of the questions that one must ask themselves in order to understand the difference include: At what stage of an attack would the data be fundamental? What is the activity related to the data? What is the date for the activity? What business does the activity affect? Contextual details are important in differentiating intelligence from information. These contextual details are quite few. It is only the information that...

In the absence of context this is just data.
Intelligence can only demonstrate its true power if it is applied effectively on real world situations. The effectiveness and value of intelligence can only be realized through an excellent strategic plan and a risk based strategy to security. Intelligence must be mapped onto relevant priorities and goals the come out of strategic approach to security (Goldfarb, 2016). This way, organizations become more strategic and selective in their clamor for intelligence. The iterations and metrics of intelligence are defined by continued re-assessment and recapitulations. Successful intelligence information utilizes continuous reassessments, tune ups and updates depending on the challenges, risks and threats that must be mitigated. The bottom-line is that context is everything when it comes to intelligence (Goldfarb, 2016). It is only under the right context that data can be viewed as intelligence instead of it simply being viewed as information. Intelligence also becomes valuable if the correct framework under which it is applied is actualized. Organizations that have a good understanding of this are able to benefit more from the value that the intelligence provides.

Based on this understanding it can be deduced that information can be freely shared between agencies and organizations. However, the value attached to intelligence would make it difficult for the institutions that hold it to share it without some kind of understanding. For instance, Facebook holds intelligence information about consumer trends. These consumer trends can be very helpful to some business entities that would use it to reposition themselves and capitalize on the given segments of the population with an objective of expanding their customer base. Facebook is never willing to share this information freely.

Google, Apple, Yahoo, Facebook and Microsoft are some of the technology companies that are not quite amenable to the sharing of information. National governments will also not share privileged security information freely without some form of regulation. The multinational technology companies probably have more data on their users than any government could have. A company like Google would want to guard its own interests. The US 4th amendment was put in place to guard the people against unreasonable seizures and searches (Whittaker, 2013). Google is not fully subject to this regulation. These multinational technology companies use consumer information to make money (Whittaker, 2013). These companies work hard to restrict the government from accessing their…

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now