Nobody downloaded yet

A Memo regarding Information and Intelligence Sharing - Research Proposal Example

Comments (0) Cite this document
Summary
Memo regarding Information and Intelligence Sharing September 11 changed the world forever. On the one hand, there are global changes in security apparatus and intelligence mechanism and on the other hand are intelligence and security systems in the United States…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
A Memo regarding Information and Intelligence Sharing
Read TextPreview

Extract of sample "A Memo regarding Information and Intelligence Sharing"

Download file to see previous pages The danger is that these recruiters may succeed as before and produce a security breach on the scale of September 11 or something even larger1 such as the use of nuclear armaments in urban areas. The need of the hour is to innovate the security apparatus by delivering them with information and intelligence that makes a difference. Information regarding the September 11 attacks was available but ineffective information sharing and collaboration led to the tragedy. The key to avert such a disaster is to strengthen the existing information and intelligence sharing mechanisms. This is obviously far easier said than done as the challenge is multifaceted and requires simultaneous efforts by myriad governmental and private agencies as well as the general population. It would be pertinent to attend this challenge logically with regards to the flow of information and intelligence that is used to initiate security actions. Information is first gathered by ground intelligence officials around the world and is then processed at various levels to see what information requires immediate action. The information deemed high priority is delivered to security agencies to initiate appropriate defense mechanisms. A look into the information gathering mechanisms will reveal that the current information gathering mechanisms are robust. ...
It must also be related here that information gathering has been strengthened inside the United States by involving the average citizen. Initiatives such as the Wal-Mart manager intelligence gathering are aimed to involve the average American citizen since the danger to the United States is more from within that from the outside. The multicultural composition of the United States and the underlying democratic principles mean that it is not practicable to create a police state to gather intelligence. Instead, the only real method to gather the right kind of intelligence is to have the average citizen on board. If information regarding any suspicious activity is reported from the grass roots level, there is a great chance that the information would be credible3. The next step to taking any real action would be to process and disseminate this information to the subject security agency. This can only be guaranteed if the intelligence sharing and information distribution network is robust enough4. For example, if a suspicious person was noticed walking down a street again and again, the local police could deal with him. However, if ground intelligence reported a group of men displaying suspicious activities in a neighborhood then the services of SWAT would be required to deal with the situation. In a similar manner, the services of other defense and security mechanisms such as the FBI and the CIA may be required depending on the circumstances. However, once again this would be subject to the processing and dissemination of information which would determine which information goes to which agencies. These inputs of information and intelligence are critical to initiating the required law enforcement processes that can guarantee the safety and well being of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“A Memo regarding Information and Intelligence Sharing Research Proposal”, n.d.)
A Memo regarding Information and Intelligence Sharing Research Proposal. Retrieved from https://studentshare.org/law/1452178-a-memorandum-from-the-perspective-of-the-secretary
(A Memo Regarding Information and Intelligence Sharing Research Proposal)
A Memo Regarding Information and Intelligence Sharing Research Proposal. https://studentshare.org/law/1452178-a-memorandum-from-the-perspective-of-the-secretary.
“A Memo Regarding Information and Intelligence Sharing Research Proposal”, n.d. https://studentshare.org/law/1452178-a-memorandum-from-the-perspective-of-the-secretary.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF A Memo regarding Information and Intelligence Sharing

Law Enforcement Information Sharing

...in the fields of law enforcement and counter terrorism believe that proper sharing of information among various intelligence agencies in different countries can become instrumental in combating such criminal activities. However, there appears to exist an element of reluctance on the part of authorities in different nations and even agencies within a country to share information. Thus, this is an area where research is warranted. In the modern world, terrorist activities have become so rampant and of such high magnitudes as to cause heavy loss to human lives, extensive damage and destruction of properties that entail huge economic losses. The present...
21 Pages(5250 words)Essay

Information Regarding CPA's Report

...?Memo Sub: Requested Information Regarding CPA’s Report From, , Controller To, Jane Smith, CEO, XYZ Company Methods Used to Determine Deferred Taxes Deferred tax can be defined as an accounting concept which indicates a future tax liability or asset arising out of temporary differences between book value of assets and liabilities and their worth for tax purposes. Generally, there are two methods including deferral methods and liability methods used to determine deferred taxes. The deferral method is applied to match tax expense with book income before tax. Under this method, deferred taxes are considered on the basis of past tax differences and they are not updated in accordance with tax...
4 Pages(1000 words)Essay

Business Intelligence Information Systems

...? Business Intelligence information systems Introduction The tools and software which influence and / or enhance a business’s strategic decision making or planning process and optimize overall planning are known as a business intelligence programs. There are various business intelligence systems which aid companies to store, gather, access and evaluate important business data in order to improve decision-making powers and capabilities of a company without any bias. There are a number of different areas business intelligence systems cater to for a corporation; for example, they cater to customers support, analysis of products, product placement, marketing segmentation, cost, profitability of the products or products, distribution... to...
3 Pages(750 words)Essay

Apple Services and iOS Systems Information Sharing

...of the Apple’s the identity theft management solutions have you managed to identify? I don’t know 7. With regards to your expertise, what are the software architectures that Apple has managed to put in place in support of both the design and requirements of user protection? N/A 8. What has Apple as a company put in place enough measures to control identity theft as well as the risks associated with personal information? N/A 1. Which personal information risks have you experience while using Apple devices? My identity and my email account 2. According to your own understanding, which measures have been put in place by Apple to control risks associated with...
74 Pages(18500 words)Dissertation

Opinions about balancing between information sharing and information protection

...Opinions about Balancing Between Information Sharing and Information Protection of the Computer Sciences and Information Technology of the Concerned Professor April 14, 2012 Opinions about Balancing Between Information Sharing and Information Protection Running institutions and organizations is primarily about the storage, retrieval, processing and dissemination of information. However, in the current times when these processes pertaining to information are getting digitized, much debate has come into existence regarding striking the right balance between information sharing and information protection. Though on the surface, there seems to be a dichotomy between the sharing and protection of information, in a pragmatic context... , there is...
2 Pages(500 words)Assignment

Over sharing of information on social networks

...compromises their integrity (Solomon 111). In essence, oversharing of information is a major problem in most networking sites, especially those with largely unregulated policies. In this regard, many people tend to share inappropriate content or too much personal information in on the social networks and this amount to oversharing of information in such platforms (MOAC 28). This paper therefore, examines the current trends, contributing factors, and impacts of oversharing of information on social networks. Social Networks Essentially, social media include all the sites in the internet that enable free interaction of people from different...
6 Pages(1500 words)Research Paper

Intelligence Information Sharing

...Intelligence Information Sharing al Affiliation Intelligence Information Sharing Intelligence information sharing refers to the process of making critical security information available to different intelligence agencies in a state beginning from the federal level to the state and local levels. Policing and police intelligence seldom intersected prior to the September 11 attack. Information sharing encountered various obstacles in its original days. It was mostly due to the complexity of the...
2 Pages(500 words)Coursework

Information Overload and Intelligence Operations

...amount of information." Intelligence analysis is more time and resource consuming as compared to data collection as recurrently referenced by the student2. However, you ignore assessing the technological innovations created to make an analysis easier, which are less time-consuming. Regardless, I agree with the student who argues that the analysis is as equally critical to intelligence operations as collection of appropriate data is. Response to Post 2 I agree that data analysts are responsible for incorrect information or the incomprehensive information because thorough analysis is rather tasking for analysts. It is good when you introduce the concept...
1 Pages(250 words)Essay

Information and Intelligence Sharing between Intelligence Agencies

...for intelligence. Related to the vital importance of human resources in intelligence, particularly with regard to intelligence prediction of the movement of the enemy and their allies, interagency cooperation is the key towards the mobilization of varied human skills and talents. Interagency cooperation provides the umbrella to bring under one roof the pool of human resource talents and skills for the conversion of data into reliable, correct, and actionable intelligence information. Interagency cooperation provides the best structure for intelligence gathering on the movement of our enemies and potential enemies. It...
25 Pages(6250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Proposal on topic A Memo regarding Information and Intelligence Sharing for FREE!

Contact Us