A Report on Criminal Law and the DoD Information Sharing Strategy

Verified

Added on  2022/10/17

|6
|1348
|11
Report
AI Summary
This report provides an overview of the Department of Defense's (DoD) information sharing strategy within the framework of criminal law. It emphasizes the importance of information sharing for national defense, highlighting its role in improving situational awareness, decision-making speed, and adaptability. The report discusses the legal and privacy barriers that hinder effective information sharing, such as constitutional rights to privacy, public concerns about data misuse, and the impact of events like WikiLeaks. It also addresses timelines for information sharing and the significance of trust between different entities. The report underscores the need for innovation and a strategic plan to overcome these challenges and ensure the effective exchange of information among government agencies, coalition partners, and international organizations. The document emphasizes how current events and diverse operations with unanticipated partners impact information sharing and the need for the DoD to adapt to these evolving circumstances.
Document Page
Running head: CRIMINAL LAW
Criminal Law
Name:
Institution:
Date:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CRIMINAL LAW
Introduction
There is a vision in strategy of sharing information which synchronizes of sharing
information initiatives and investments is done through the Defense Department (DoD).
Information sharing is increasingly becoming important mission in the success of deportment
of defense. It is important to change information effectively among government agencies,
components, coalition partners, international organizations and foreign governments in the
critical role of the agency to defend the nation while executing national strategy (Ab Rahman,
& Choo, 2015).
Information sharing landscape and Strategy
Information sharing and improving sharing of information constitutes of laws that are
the cornerstone of priorities of national interest. The strategy enables support and gives the
highest authority levels in information sharing to executive orders of the president, the DoD
QDR and national strategies.
Through the strategy of information sharing, the defense department will improve
situational analysis, increased forces of adaptability, reduction of decision time. Increase
unity effort and a greater precision in planning and execution strategy. DoD will require
increased innovation to enhance information sharing within the department and across with
the partners that are external. Numerous departmental and national strategies greatly affect
the accessibility and information flow therefore limiting the capability to take advantage of
strategic information sharing as asset in achieving the mission of the department. In addition
to this, current event in sharing information have global and diverse reaching impacts while
drawing operations with unanticipated partners (AlHogail, 2015).
Document Page
CRIMINAL LAW
Policies, goals, and objectives within the strategy
The Defense department in its strategy to convey information should establish goals and
visions for sharing information while allowing a more detailed initiative to implement and
actions necessary for documentations to achieve the vision realized. Improving security
sharing helps the department to realized information sharing as a strategic investment assets.
The benefits of information sharing include;
1. Achieve effort unity mission across coalitions of operations
2. Improve the execution of decision speed.
3. Improving adaptability rapidly across missions of operations.
4. Improve and anticipate the ability to anticipate resource needs and events
5. Providing situational advantage and conditions setting for success (Laszka,
Felegyhazi, & Buttyan, 2015).
Sharing of information is making available information to the people, systems and
processes. Information sharing may include managerial, cultural and technical behaviors and
leverage on information sharing. The DoD strategy of sharing information establishes the
future vision.
The purpose of information sharing strategy for DoD provides a vision that is common,
approaches and goals that guide information sharing investments and initiatives for the
department of defense. The information strategy fulfils the Quadrennial Defense Review
(QDR) and guides the department’s information exchange within the state, coalition partners,
security forces, other governments and other organizations that are external (Nazareth, &
Choi, 2015).
This information strategy describes the approach of sharing information for the
Defense Secretary, chairman of the joint chief of staff, departments in military, inspector
Document Page
CRIMINAL LAW
General in the DoD, commandant commands and other field in the DoD. It guides activities
of sharing information among internal and external partners while planning for strategies to
share common vision. DoD will then develop a strategic information strategic plan as a
document for companion of sourced information. The is need to synchronize and provide
integrated guidance on information and its shared activities and initiatives to support DoD.
The synchronized initiatives include both the externally and internally shared efforts. The
strategic plan for sharing information expands the identified strategies and considerations
while providing descriptions in roles, responsibilities, actions, milestones, priorities and
metrics. Effective sharing of information provides an opportunity for DoD to achieve
situational awareness and enhance fater decision making.
Time line for the implementation of the strategy
The timeline for sharing information and intelligent gathering of information should
be left to relevant departments. DoD as the national security agency for defense against
external aggression believes that some acts of terrorism for example cant take a lot of time for
information that is credible to be shared with other foreign entities. For example, in the case
of Osama bin Laden, the DoD spent several years tracing the lead suspect and never shared
major information with the Pakistani governments as it thought the information will be
leaked to sources close to the suspect (Peltier, 2016).. The timeline of information sharing
greatly depends on the level of activity to be undertaken by DoD and the trust level between
different entities. Government to government security arms tend to share a lot of information
on security. However, the DoD may issue security alerts and warnings to foreign bodies and
entities as a security and information sharing strategy aimed at halting a perceived attack.
Barriers to implementing the strategy, such as legal or privacy issues
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CRIMINAL LAW
Information has become the world power. Countries that have massive data on information
like the United States, China and Russia are superpowers because they control the
information that is essential for people development. However, there are many barriers that
are both legal and privacy that affect sharing of information
1. The law is very clear on the fundamental rights to privacy- privacy is enshrined in the
constitution and sharing of information is limited thus limiting movement of
information. An example is the WikiLeaks, an site that hacked into government
operatives and revealed top secrets by governments leading to major fallouts within
governments. Individual rights to privacy is also core limiting phone tapings by
government security agents and IT personnel.
2. Legal issues relating to privacy- despite the innovation and progress desire, the
citizen’s privacy regulations and considerations remains top barriers to information
sharing. The public remains highly pessimistic about sharing of information and much
concerned about the loss of individual privacy. Their concern is that the information
will be used in ways that is not of good will (Soomro, Shah, & Ahmed, 2016).
3. Fear regarding misuse of shred information that may lead to wrong using of people
data.
Conclusion
Numerous departmental and national strategies greatly affect the accessibility and
information flow therefore limiting the capability to take advantage of information as
strategic asset in achieving the mission of the department. In addition to this, current event in
sharing information have global and diverse reaching impacts while drawing operations with
unanticipated partners.
Document Page
CRIMINAL LAW
References
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident
handling in the cloud. computers & security, 49, 45-69.
AlHogail, A. (2015). Design and validation of information security culture
framework. Computers in Human Behavior, 49, 567-575.
Laszka, A., Felegyhazi, M., & Buttyan, L. (2015). A survey of interdependent information
security games. ACM Computing Surveys (CSUR), 47(2), 23.
Nazareth, D. L., & Choi, J. (2015). A system dynamics model for information security
management. Information & Management, 52(1), 123-134.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines
for effective information security management. Auerbach Publications.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs
more holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]