Reference no: EM13766298
Read the 10-page report titled Information Sharing, Dot Connecting and Intelligence Failures: Revisiting Conventional Wisdom, by Russell Travers (2009). To access the report, click on the following link, and then scroll down to the bottom of the page. At the bottom, click on the link with the same title as the report:
National Counterterrorism Center Web site
Travers argues that information sharing in general has improved significantly since the attacks of 9/11. He proceeds to deconstruct many popular arguments made by others claiming that intelligence gathering and information sharing, as practiced by entities in the United States today, are flawed. He also discusses legal, policy-based, and regulatory obstacles that impair reasonable intelligence and information collection and processing.
After reading this piece, complete the following:
Define (that is, "operationalize") the concepts of intelligence versus information.
Do differences in these terms matter?
How might either be easier-or more difficult-to share with other agencies?
Also consider if some levels of government or sectors of society might be more or less amenable to sharing information. (For example, private sector entities that own and operate critical infrastructure upon which the nation or communities rely might hesitate to share proprietary information that makes them less competitive, economically. Is their reluctance reasonable?)
Research, summarize, critically evaluate, and report at least 3 of the significant information-sharing problems and challenges (and key agencies) reported in the 9/11 Commission Report.
For each of these challenges, use or dispute at least 2 of Travers' main arguments that he makes in his paper to explain or justify these challenges.
Make certain to connect Travers' arguments to the report's challenges that you select.
Are fusion centers now being used as a local law enforcement
: Are fusion centers now being used as a local law enforcement tool to help fight local crime? Why or why not? Post a new topic to the Discussion Board that contains your responses to the above questions
|
Aspects of the regulatory environment
: Write a paper that describes the main aspects of the regulatory environment which will protect the public from fraud within corporations, Pay particular attention to SOX requirements.
|
Assume debt tax shields have a net value
: Digital Organics (DO) has the opportunity to invest $0.93 million now (t = 0) and expects after-tax returns of $530,000 in t = 1 and $630,000 in t = 2. The project will last for two years only. The appropriate cost of capital is 14% with all-equity f..
|
Formation of the solar system
: Describe other kinds of objects (asteroids, comets, and so on) found in the solar system.
|
Concepts of intelligence versus information
: Define (that is, "operationalize") the concepts of intelligence versus information. Do differences in these terms matter? How might either be easier-or more difficult-to share with other agencies
|
Monitoring controls for three distinct types of business
: Inventory control requires constant attention. Propose a set of guidelines that reflect the necessary monitoring controls for three distinct types of business (e.g., a shoe retailer, a physician's office, and a food vending truck) to minimize loss..
|
Compare and contrast utilitarianism kant and aristotle
: Explain the dilemma, and compare and contrast Utilitarianism, Kant, and Aristotle on which option should be chosen, and why.
|
Assignment on bid strategy
: Review the action plan from the first assignment and create a future plan that is consistent with federal procurement opportunity's mission or strategic plan.
|
What strengths currently exist in the united states
: What types of strategies can be used for critical infrastructure protection (CIP)? What strengths currently exist in the United States with regard to CIP? Explain
|