Contemporary Threats And Sharing Of Information Research Paper

¶ … Threats and Sharing of Information Unified Intelligence

In many respects, the amount of danger posed by contemporary threats to public safety has rarely been greater in this country's history. This fact can largely be attributed to the degree of organization and the sharing of information via technological advances with which various factions have at their disposal to effectively terrorize parts of the United States, as well as to the somewhat imperialist tendencies of America's current foreign policy, which people in many parts of the world view as aggressive. One of the most significant offensives launched against the U.S. -- and on its own soil, at that -- was the toppling of the world trade center in 2001. Reports of other so-called terrorist activity (such as the young man from Africa who attempted to detonate a bomb on an airplane above Michigan who was linked to Al Qaeda) (Temple-Raston, 2010) have substantially multiplied since the devastation that served...

...

With both foreign as well as domestic threats (from organized groups as well as from average antisocial Americans) walking about, the need to disseminate information between disparate levels of law enforcement -- from federal, state, and municipal levels of government -- is fairly imminent.
Traditionally, U.S. domestic policy widely discouraged the sharing of intelligence between these three fundamental levels of government due to concerns of sensitivity. In the context of national security, sensitivity is the measure of how risky it is to disclose information to anyone, including law enforcement officials at various stages of federal, state and municipal levels, out of the belief that doing so could present a greater threat to the country as a form of vulnerability. Most often, this belief was fueled by the notion that disclosing such information would fuel a tide of panic among people, as well as alert whichever threat was relevant at…

Sources Used in Documents:

References

Leson, J. (2005). "Assessing and Managing the Terrorist Threat." Bureau of Justice Assistance. Retrieved from https://www.ncjrs.gov/pdffiles1/bja/210680.pdf

Temple-Raston, D. (2010). "Officials: Cleric had Role in Christmas Bomb Attempt." NPR. Retrieved from http://www.npr.org/templates/story/story.php?storyId=123894237


Cite this Document:

"Contemporary Threats And Sharing Of Information" (2012, January 26) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/contemporary-threats-and-sharing-of-information-53815

"Contemporary Threats And Sharing Of Information" 26 January 2012. Web.19 April. 2024. <
https://www.paperdue.com/essay/contemporary-threats-and-sharing-of-information-53815>

"Contemporary Threats And Sharing Of Information", 26 January 2012, Accessed.19 April. 2024,
https://www.paperdue.com/essay/contemporary-threats-and-sharing-of-information-53815

Related Documents

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Threat Analysis
PAGES 8 WORDS 2524

Threat Analysis A Foreign Intelligence Entity (FIE) can be delineated as any identified or suspected foreign organization, individual, or group, whether private, public, or governmental, that undertakes intelligence activities to obtain United States information, block or damage U.S. intelligence gathering, impact U.S. policy, or mess up U.S. systems and programs. In particular, this term takes into account an international terrorist organization and also a foreign intelligence and security service.[footnoteRef:1] The FIE

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Terrorism in Seattle Even before the World Trade Center attack in September, 2011, most major cities in the United States were not only aware, but anticipatory regarding the potential for a terrorist attack. Seattle has been fortunate in that it has never experienced an actual international attack, but has had three major domestic incidents since 1999 that continue to be in the minds of Emergency Management professionals. In 1999, Ahmed Ressam,

Creating Organizational Value through the Integration of Information Technology: A Management Perspective Change Management and the Construction of a Receptive Organization Transformational and Participative Leadership A Decentralized Organizational Culture Effective Utilization of Resources Simulations Performance Monitoring Systems Risk Management and Support Strategies When considering the ever-changing and highly competitive global landscape of business today, firms must stay at the cutting edge of their respective fields in order to sustain profitability in the long-term. With the current exponential growth

" (Tolone, Ahn, Pai, et al. 2005 P. 37). Table 1 provides the summary of the evaluation of various criteria mentioned in the paper. The table uses comparative terminology such as High, Medium and Low and, descriptive terminology such as Active, Passive, and Simple, and the standard Yes (Y) and No (N). The research provides the solutions based in the problems identified with the access controls evaluated. Table I: Evaluation of Access