HLS-420: HOMELAND SECURITY: PREPAREDNESS, PREVENTION, AND DETERRENCE
Module 6—Is Information Sharing Too Regulated? Has a Lack of Sharing Caused a Key Intelligence Failure?
OBJECTIVES
After successfully completing module 6, you should be able to:
? Compare and contrast law enforcement versus intelligence community regulations on information sharing.
? Justify the key components of an information sharing regulation using a current regulation as a jumping-off point.
? Examine and discuss the role of information sharing as a cause of “intelligence failures.”
? Design an inter-agency information sharing model that takes into account current regulations on intelligence sharing, agency protocols, and operational security.
STUDY MATERIALS
Textbook Readings
? Chapters 4 and 6 in: Keeping Us Safe: Secret Intelligence and Homeland Security, Arthur S. Hulnick.
? Chapter 15, in: Criminal Intelligence for the 21st Century, Marilyn B. Peterson.
? Chapters 8 and 13, in: 9/11 Commission Report, 9/11 Commission.
Online Article
? National Criminal Intelligence Sharing Plan, US Department of Justice (2005)
ACTIVITIES
Module 4 has two activities. Please consult the Course Calendar for the due dates.
Discussion Forum 6
In Discussion Forum 6, post your response (200 words or more) to the following discussion topic. Reply to at least two classmates’ responses by the date indicated in the Course Calendar. Your remarks should be concise and without spelling or grammatical errors.
? Both law enforcement and national security organizations have regulations regarding collecting and storing information gathered. Referencing at least one regulation from each, indicate what you think reasonable restrictions on information collection and storage could be.
Written Assignment 4
Many press reports, and to some extent the 9/11 Commission Report, referred to the failure to share information as one reason the US was unable to prevent the terrorist attacks of 9/11/01. Cite at least two specifics that point to this being true or why not.
? Discuss at least two information sharing models that have been recommended since then.
? Summarize some technology available to support these information sharing models.
? Discuss what you think would be the most effective information sharing model to help prevent terrorist attacks.
The paper should be 3 – 5 pages in length and use the APA style of citations.