Verified Document

911 Commission Report Intelligence And Information Sharing Essay

Related Topics:

Intelligence, Information Sharing, and the 9/11 Commission Report Intelligence versus information

There two terms are fundamentally different for a number of reasons. The reason the terms are different can be decoded by investigating the ‘why’ from the information gathered. According to Lance (2017) the ‘how’ or ‘what’ is not important in decoding intelligence information. The resource needed to produce valued and true intelligence is by understanding why. The sole purpose any entity receives finished intelligence is to make it possible for the entity to make strategic, operational and tactical decisions with the information received. The media takes information received and takes steps towards transforming this information into stories hence creating actionable intelligence. In essence, according to Lance (2017) intelligence changes the how and what in information into when and why in the process of decision making. Information only becomes finished intelligence through detailed analysis of that information.

Tallmadge (2016) defines information as knowledge that is communicated concerning a circumstance or particular fact. On intelligence, Tallmadge (2016) defines it as the process of seeking information, determining what that information means, and following this up by using the information to take strategic action. Information is available everywhere from sources such as newspapers, daily news, blogs, one on one conversations etc. Intelligence on the other hand often details the information that is not necessarily readily and freely available. Intelligence information may not be found within public domains (Tallmadge, 2016). Intelligence as perceived by the public is privileged information which is intended to be consumed by specific audiences (Mostly security officials). Intelligence is an art of gathering the protected and privileged information and using it to the benefit of the public.

From the perspective of Goldfarb (2016), the principle difference between intelligence and information is data. Data does not have any context by itself. It would not be helpful to anyone in trying to solve a particular problem. In determining the difference between data and intelligence context is very important. Some of the questions that one must ask themselves in order to understand the difference include: At what stage of an attack would the data be fundamental? What is the activity related to the data? What is the date for the activity? What business does the activity affect? Contextual details are important in differentiating intelligence from information. These contextual details are quite few. It is only the information that...

In the absence of context this is just data.
Intelligence can only demonstrate its true power if it is applied effectively on real world situations. The effectiveness and value of intelligence can only be realized through an excellent strategic plan and a risk based strategy to security. Intelligence must be mapped onto relevant priorities and goals the come out of strategic approach to security (Goldfarb, 2016). This way, organizations become more strategic and selective in their clamor for intelligence. The iterations and metrics of intelligence are defined by continued re-assessment and recapitulations. Successful intelligence information utilizes continuous reassessments, tune ups and updates depending on the challenges, risks and threats that must be mitigated. The bottom-line is that context is everything when it comes to intelligence (Goldfarb, 2016). It is only under the right context that data can be viewed as intelligence instead of it simply being viewed as information. Intelligence also becomes valuable if the correct framework under which it is applied is actualized. Organizations that have a good understanding of this are able to benefit more from the value that the intelligence provides.

Based on this understanding it can be deduced that information can be freely shared between agencies and organizations. However, the value attached to intelligence would make it difficult for the institutions that hold it to share it without some kind of understanding. For instance, Facebook holds intelligence information about consumer trends. These consumer trends can be very helpful to some business entities that would use it to reposition themselves and capitalize on the given segments of the population with an objective of expanding their customer base. Facebook is never willing to share this information freely.

Google, Apple, Yahoo, Facebook and Microsoft are some of the technology companies that are not quite amenable to the sharing of information. National governments will also not share privileged security information freely without some form of regulation. The multinational technology companies probably have more data on their users than any government could have. A company like Google would want to guard its own interests. The US 4th amendment was put in place to guard the people against unreasonable seizures and searches (Whittaker, 2013). Google is not fully subject to this regulation. These multinational technology companies use consumer information to make money (Whittaker, 2013). These companies work hard to restrict the government from accessing their…

Cite this Document:
Copy Bibliography Citation

Related Documents

Sharing and Terror Attacks: According to the
Words: 1198 Length: 4 Document Type: Essay

Sharing and Terror Attacks: According to the findings of the 9/11 commission or the National Commission on Terrorist Attacks Upon the United States and several media reports, breakdowns in information sharing and failure to combine relevant intelligence are some key factors in the failure to stop the 9/11 terror attacks. Consequently, intelligence gathering and information sharing have become vital components of the U.S. government efforts to fight terrorism. Actually, the

Domestic Terrorism on Policing Since 911 Criminal
Words: 2231 Length: 8 Document Type: Essay

Domestic Terrorism on Policing since 911 Criminal justice incorporates government institutional systems and practices that aim at combating and deterring crime, or sanctioning the law offenders through rehabilitation efforts or criminal penalties, all with a goal of upholding social control. The accused persons have entitlement to protection against any investigatory and prosecution power abuses, unless found guilty. Despite all these efforts, criminal activities within the globe has ever been at

9/11 and the Failure of Imagination
Words: 1780 Length: 4 Document Type: Essay

Shared Information in Terrorist Attacks Many press reports, and to some extent the 9/11 Commission Report, referred to the failure to share information as one reason the U.S. was unable to prevent the terrorist attacks of 9/11/01. Just days after the terrorist attacks in Paris by self-professed operatives of Al-Qaeda in Yemin, this discussion could not be timelier or more pertinent. Once again, the pivotal significance of integrated counterterrorist intelligence -- coupled

Response to 9/11 Creation of the DNI DHS and Iraq Invasion
Words: 1875 Length: 6 Document Type: Essay

The Failures of the Intelligence Community Leading to 9/11IntroductionThe investigation of the 9/11 terrorist attacks revealed a massive failure of the U.S. intelligence community. Despite numerous signs pointing to an impending terrorist attack, the intelligence community failed to prevent the deadliest terrorist attack on U.S. soil. One of the main issues was the lack of coordination and seriousness among the various branches of US intelligence. This paper discusses these failures

New Threats and Law Enforcement
Words: 870 Length: 3 Document Type: Discussion Chapter

New Terrorism How can police and law enforcement agencies best utilize resources to confront this new threat? Briefly describe the important features of "new terrorism" as discussed in the readings. What is "new" about contemporary, international terrorism? Identify the police and law enforcement resources most relevant or essential to the threat of terrorist attacks. Also identify any important gaps between resources and needs. In contrast to the terrorists of the past, the most

Corrections/Police Law Enforcement Police Technology
Words: 3819 Length: 14 Document Type: Term Paper

The middle of the decade of the 1980's was witness to the creation of the Technology Assessment Program Information Center and the Technology Program Advisory Agency. Their functions were as follows: Technology Assessment Program Information Center: Picked up laboratories for testing equipment, supervised the testing process, published reports concerning the results that the lab released after testing. Technology Program Advisory Agency: This was a large advisory body of senior local and federal

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now