Essay on Information Sharing to Prevent Attacks to the US

Essay on Information Sharing to Prevent Attacks to the US

Length: 1009 words (2.9 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

Over the past twelve years, the intelligence community has become the most valuable entity following the terrorist attacks on 9/11 and garnered significant support from the Bush and Obama administrations. The intelligence community has not been able to successfully share information dating back to 1941 when ambassador Grew delivered critical information, pertaining to Pearl Harbor, to the White House and political and military leaders overlooked it.1 Events such as this make leaders look back and wonder what would the outcome be if the information had reached its final destination. Intelligence is key to successfully countering or disrupting activities conducted by our adversaries. Because the intelligence community continues to encounter roadblocks pertaining to information sharing between federal agencies, federal agencies and state/local law enforcement, and military and law enforcement, intelligence gaps will continue to exist allowing the ever growing terrorist plots/activities to continue threatening the way of life for all across the globe. Closing these gaps will allow for a more direct action to occur in order to intercept and prevent attacks from occurring worldwide.
Federal agencies have continued to have issues with intelligence sharing amongst each other since their creation. The issues that agencies tend to have with sharing information is remaining autonomous and overcoming investigation concerns. Agencies tend to hoard information collected in the locality of its intelligence element such as the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), or the Department of Homeland Security (DHS) allowing that specific agency to remain autonomous. Agencies will also label their intelligence ...


... middle of paper ...


...ps.law.gwu.edu/LR/ArticlePDF/78-2-Sales.pdf (accessed March 23, 2014).

3. Hunter, Thomas. "The Challenges of Intelligence Sharing." Operational Studies (2004), http://www.operationalstudies.com/terrorism/TerrorismIntelligencePaper2.pdf (accessed March 23, 2014).

4. "Federal Support for and Involvement in State and Local Fusion Centers." U.S. Senate Committee on Homeland Security and Governmental Affairs. http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0CEoQFjAD&url=http://www.hsgac.senate.gov/download/report_federal-support-for-and-involvement-in-state-and-local-fusions-centers&ei=5pwrU-OcOqXB0gGysYCYDA&usg=AFQjCNEY5sKmzFYKts_5F0R5KDR-3QwwZg&sig2=fMouOQcMgsgQVls2TPV1cA (accessed March 20, 2014).

5. "Pentagon Database Amasses Millions of Non-Military Police Records." http://rt.com/usa/linx-pentago-ncis-database-405/ (accessed March 23, 2014).

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay on The Issue Of Information Security Programs

- As relates to the Issue of Information Security programs, the Department of Health and Human Sciences has formulated various different policies aimed at governing information handling and security as concerns all the departments’ resources. Common in the list of policies are the Policy on Information and Technology security for Remote Access which was established to ensure the information and technology departments resources are appropriately protected during the authorization of remote accessibility to the automated information and system of the department of human and health services....   [tags: Information security, Security, Confidentiality]

Strong Essays
1094 words (3.1 pages)

Information shortfalls that led to 9/11 attacks Essay

- THE WALL Rules and constraints, or what many refer to as a “legalistic wall” misinterpreted by some and misunderstood by others, made it very difficult for the IC to share information before 9/11. Best (2007), maintained that the Intelligence Community failed to share information because there were “walls” between intelligence and law enforcement agencies. These walls kept analysts from talking to each other and from sharing pieces of information that, if they had been viewed in close relationship, might have yielded a coherent picture of the emerging plot....   [tags: Legalistic Wall, Intelligence Community]

Strong Essays
1304 words (3.7 pages)

What Is Information Security And Why It Is Important? Essay

- What is Information Security and why it is Important. Information security refers to “the process and methodologies that are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption” (SANS Institute, n.d.). Information security programs are important in maintaining confidentiality, integrity, and availability (figure 1 page X). For example, a Trojan horse was planted on your system and result in the loss of customers’ personal and financial information....   [tags: Information security, Computer security, Error]

Strong Essays
1679 words (4.8 pages)

Essay about E-Commerce and Cyber Attacks

- E-commerce security threats and technology solution dimensions consist of integrity, authenticity, confidentiality, privacy, availability, etc. (Laudon & Traver, 2012, p.268). The internet can serve as a very useful tool or it can be a tool manipulated to perform unethical actions. Its function as tool all depends on what the user and what they intend to do with the information they download, view or share. Many analysts trace the increase in the number of issues faced by consumers today to the internet....   [tags: Security ]

Strong Essays
1904 words (5.4 pages)

Web Security And Web Privacy Attacks Essay

- Web security & Web Privacy Attacks: Introduction and preface to the problem Web privacy is a key web security concern to almost all the internet users now a days. Lapses in Web security essentially possessing the threat to the privacy loss. All the information related to the personal identity, web browsing history, web activities are some of the essential key concerns that people loose during the web privacy attack. Information revolution spurred in the recent times added to the significance to the problem severity....   [tags: World Wide Web, Internet, Web page]

Strong Essays
1147 words (3.3 pages)

Can Information Systems Help Prevent A Public Health Care Crisis Essay

- Question 1: Describe and diagram the existing process for reporting and identifying major public health problems, such as a flu pandemic. The existing or traditional approach to reporting potential public health problems is a manual process reliant on individuals within individual hospitals/medical facilities to identify such potential threats or issues. Physicians or laboratories within the hospital identify any potential health risks and then compile a report on the issue. The identification of the issue/risk is reliant on individual hospitals tracking the volume numbers of patients with similar symptoms....   [tags: Public Health Care Essays]

Free Essays
1107 words (3.2 pages)

Failure For Share Information And How On Fix The Problem Essay

- Failure to Share Information and How to Fix the Problem Anyone who watched, or listened, to a news broadcast after the horrendous terrorist attacks on September 11, 2001 probably remembers hearing about the failure of our nation’s leading intelligence agencies. It was very difficult for everyone to process that such a terrible thing could happen on our nations soil, and no one had a clue what was going on. In fact, it was so difficult to believe that our countries highest authority ordered a commission be formed in order to find out exactly what happened and why....   [tags: Federal Bureau of Investigation]

Strong Essays
1003 words (2.9 pages)

Essay on How Can We Be More Prepared for Terrorist Attacks on US Soil?

- Introduction If we have learned nothing else in recent years, we know that protecting the United States requires a multi-faceted approach to prevention, innovation, and response. In December of 2003, the President issued Homeland Security Directive (HSPD)-8 to establish a federal policy that aims to strengthen our preparedness against many types of emergencies, including terrorist response. Unfortunately, the approach taken by many departments in emergency response is to use examples based upon prior experience, but prior experience leans heavily on natural disasters rather than the unique characteristics of terrorist incidents....   [tags: warr on terror, homeland security]

Strong Essays
2011 words (5.7 pages)

The P2P Piracy Prevention Act Attacks Consumers Essay example

- The P2P Piracy Prevention Act Attacks Consumers Peer-to-peer (P2P) networks have had a staggering growth in the past few years. Since Napster, dozens of P2P networks have been created in its imitation. Due to the growing accessibility of broadband, which increases the speed of downloads, P2P networks generate nearly 1.8 billion downloads per month. Popularity and acceptance is still continually growing. As many users see P2P software as just file sharing, entertainment industries and other big companies see it as copyright infringement and stealing from copyright owners without their rightful authorization or compensation....   [tags: Technology Internet Essays]

Strong Essays
1107 words (3.2 pages)

Essay about Privacy of Personal Information on the Internet

- Privacy of Personal Information on the Internet Introduction What is privacy. According to Webster’s Dictionary the following is the definition of privacy [6]: “Secrecy; or one’s private life or personal affairs”. A Person has information that he does not want to share or does want to share to with everyone. This is a right of an individual and the violation of this right is called invasion of privacy. The concept of privacy converts to the notion of information in the world of internet. Information in this case might constitute to email address, credit card number, social security number etc....   [tags: Web Cyberspace Private Essays]

Strong Essays
2152 words (6.1 pages)