Verified Document

Contemporary Threats And Sharing Of Information Research Paper

¶ … Threats and Sharing of Information Unified Intelligence

In many respects, the amount of danger posed by contemporary threats to public safety has rarely been greater in this country's history. This fact can largely be attributed to the degree of organization and the sharing of information via technological advances with which various factions have at their disposal to effectively terrorize parts of the United States, as well as to the somewhat imperialist tendencies of America's current foreign policy, which people in many parts of the world view as aggressive. One of the most significant offensives launched against the U.S. -- and on its own soil, at that -- was the toppling of the world trade center in 2001. Reports of other so-called terrorist activity (such as the young man from Africa who attempted to detonate a bomb on an airplane above Michigan who was linked to Al Qaeda) (Temple-Raston, 2010) have substantially multiplied since the devastation that served...

With both foreign as well as domestic threats (from organized groups as well as from average antisocial Americans) walking about, the need to disseminate information between disparate levels of law enforcement -- from federal, state, and municipal levels of government -- is fairly imminent.
Traditionally, U.S. domestic policy widely discouraged the sharing of intelligence between these three fundamental levels of government due to concerns of sensitivity. In the context of national security, sensitivity is the measure of how risky it is to disclose information to anyone, including law enforcement officials at various stages of federal, state and municipal levels, out of the belief that doing so could present a greater threat to the country as a form of vulnerability. Most often, this belief was fueled by the notion that disclosing such information would fuel a tide of panic among people, as well as alert whichever threat was relevant at…

Sources used in this document:
References

Leson, J. (2005). "Assessing and Managing the Terrorist Threat." Bureau of Justice Assistance. Retrieved from https://www.ncjrs.gov/pdffiles1/bja/210680.pdf

Temple-Raston, D. (2010). "Officials: Cleric had Role in Christmas Bomb Attempt." NPR. Retrieved from http://www.npr.org/templates/story/story.php?storyId=123894237
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology Holds Great Promise for Improving
Words: 3297 Length: 12 Document Type: Term Paper

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Risk Identification in Information Security
Words: 5004 Length: 15 Document Type: Thesis

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Information System and Business Management
Words: 13763 Length: 50 Document Type: Dissertation

Creating Organizational Value through the Integration of Information Technology: A Management Perspective Change Management and the Construction of a Receptive Organization Transformational and Participative Leadership A Decentralized Organizational Culture Effective Utilization of Resources Simulations Performance Monitoring Systems Risk Management and Support Strategies When considering the ever-changing and highly competitive global landscape of business today, firms must stay at the cutting edge of their respective fields in order to sustain profitability in the long-term. With the current exponential growth

Access Control in Information Security
Words: 2594 Length: 8 Document Type: Research Paper

" (Tolone, Ahn, Pai, et al. 2005 P. 37). Table 1 provides the summary of the evaluation of various criteria mentioned in the paper. The table uses comparative terminology such as High, Medium and Low and, descriptive terminology such as Active, Passive, and Simple, and the standard Yes (Y) and No (N). The research provides the solutions based in the problems identified with the access controls evaluated. Table I: Evaluation of Access

Computerized Accounting Information Systems in a Global
Words: 1947 Length: 6 Document Type: Essay

Computerized Accounting Information Systems In a global contemporary business environment, the computerized accounting information systems have become an integral part of organizational accounting systems. The development Information and Communication Technology (ICT) has assisted organizations to migrate from the traditional accounting method to a computerized accounting systems. The integration of ICT with accounting methods has given rise to Accounting Information System (AIS) that assist organizations to deliver timely and accurate financial information which

Classify Information and Democracy Classifying
Words: 1933 Length: 7 Document Type: Research Paper

This really depends upon which actor is selected as the begining point, the responses to the following questions will not be the same. Why is there so much beef with this website leaking information? WikiLeaks -- as it talks about on the website -- 'bring[s] significant news and info to those in the community. They give an groundbreaking, protected and anonymous way for sources to leak material to journalists'

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now