Verified Document

Contemporary Threats And Sharing Of Information Research Paper

¶ … Threats and Sharing of Information Unified Intelligence

In many respects, the amount of danger posed by contemporary threats to public safety has rarely been greater in this country's history. This fact can largely be attributed to the degree of organization and the sharing of information via technological advances with which various factions have at their disposal to effectively terrorize parts of the United States, as well as to the somewhat imperialist tendencies of America's current foreign policy, which people in many parts of the world view as aggressive. One of the most significant offensives launched against the U.S. -- and on its own soil, at that -- was the toppling of the world trade center in 2001. Reports of other so-called terrorist activity (such as the young man from Africa who attempted to detonate a bomb on an airplane above Michigan who was linked to Al Qaeda) (Temple-Raston, 2010) have substantially multiplied since the devastation that served...

With both foreign as well as domestic threats (from organized groups as well as from average antisocial Americans) walking about, the need to disseminate information between disparate levels of law enforcement -- from federal, state, and municipal levels of government -- is fairly imminent.
Traditionally, U.S. domestic policy widely discouraged the sharing of intelligence between these three fundamental levels of government due to concerns of sensitivity. In the context of national security, sensitivity is the measure of how risky it is to disclose information to anyone, including law enforcement officials at various stages of federal, state and municipal levels, out of the belief that doing so could present a greater threat to the country as a form of vulnerability. Most often, this belief was fueled by the notion that disclosing such information would fuel a tide of panic among people, as well as alert whichever threat was relevant at…

Sources used in this document:
References

Leson, J. (2005). "Assessing and Managing the Terrorist Threat." Bureau of Justice Assistance. Retrieved from https://www.ncjrs.gov/pdffiles1/bja/210680.pdf

Temple-Raston, D. (2010). "Officials: Cleric had Role in Christmas Bomb Attempt." NPR. Retrieved from http://www.npr.org/templates/story/story.php?storyId=123894237
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology Holds Great Promise for Improving
Words: 3297 Length: 12 Document Type: Term Paper

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Risk Identification in Information Security
Words: 5004 Length: 15 Document Type: Thesis

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Threat of Terrorism Weighing Public Safety in Seattle
Words: 5948 Length: 17 Document Type: Case Study

Terrorism in Seattle Even before the World Trade Center attack in September, 2011, most major cities in the United States were not only aware, but anticipatory regarding the potential for a terrorist attack. Seattle has been fortunate in that it has never experienced an actual international attack, but has had three major domestic incidents since 1999 that continue to be in the minds of Emergency Management professionals. In 1999, Ahmed Ressam,

Information System and Business Management
Words: 13763 Length: 50 Document Type: Dissertation

Creating Organizational Value through the Integration of Information Technology: A Management Perspective Change Management and the Construction of a Receptive Organization Transformational and Participative Leadership A Decentralized Organizational Culture Effective Utilization of Resources Simulations Performance Monitoring Systems Risk Management and Support Strategies When considering the ever-changing and highly competitive global landscape of business today, firms must stay at the cutting edge of their respective fields in order to sustain profitability in the long-term. With the current exponential growth

Access Control in Information Security
Words: 2594 Length: 8 Document Type: Research Paper

" (Tolone, Ahn, Pai, et al. 2005 P. 37). Table 1 provides the summary of the evaluation of various criteria mentioned in the paper. The table uses comparative terminology such as High, Medium and Low and, descriptive terminology such as Active, Passive, and Simple, and the standard Yes (Y) and No (N). The research provides the solutions based in the problems identified with the access controls evaluated. Table I: Evaluation of Access

Classify Information and Democracy Classifying
Words: 1933 Length: 7 Document Type: Research Paper

This really depends upon which actor is selected as the begining point, the responses to the following questions will not be the same. Why is there so much beef with this website leaking information? WikiLeaks -- as it talks about on the website -- 'bring[s] significant news and info to those in the community. They give an groundbreaking, protected and anonymous way for sources to leak material to journalists'

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now