Importance of Keeping Sensitive Items Secure
In opening this essay will be covering the importance of keeping accountability of and securing sensitive items and its effect it has and can have on completing the mission. As well as maintaining Operational Security (OPSEC). I will also be covering the Army’s views and standards on maintaining sensitive item accountability and the punishments that can be set forth to an individual or group by section leader or chain of command. I will be using references and real life scenarios to illustrate its importance. I am writing this essay due to the fact that on 12 January 2011 around 0700 hours on Forward Operating Base Salerno, Afghanistan. I -------left my identification card unsecured in a
…show more content…
This is all do to the fact that a thumb drive device was used against military regulations banning the use of any portable memory storage devices. Due to the fact that not only have problems like this arose, but the spread of viruses, Trojans, and other spamming and hacking codes have affected military computer networks several times. This is dangerous and has a direct negative affect on the operational missions over seas and security both on the homeland and abroad. It can allow the opposing forces to not only obtain battle
Page 2 of 3
Plains and battle focus. But allow them to obtain the number strengths and locations of ours and allied forces. As well as let them obtain information on individuals that supply are government with vital Intel on operations, plans and relations of our opposing forces and their allies. This is extremely detrimental to our operations due to the fact that the vital information source is lost and can cause loss of human lives, allies and allies. Lynn’s decision to declassify the incident reflects the Pentagon’s desire to raise concern over the threats facing the U.S. governments 15,000 networks and 7 million computing devices that are being probed thousands of times a day, experts said. This all relates to the fact that all it takes is
Approximately 2,800 records, including field reports, cables, and interview summaries, have been released to the public by National Archives. Conversations from the FBI, CIA, and congressional investigators discussing dead ends, exhausted leads, interviews, as well as the checking and rechecking of sources, are just a snippet of information now available to the public.
This essay will be about the importance of keeping the accountability of sensitive items and how the accountability of sensitive items affects the unit. AR 710-2 and AR 735-5 both cover the Army policy for property accountability. Some sensitive items are your weapon, military ID card, communication equipment, etcetera. Sensitive items are anything that can be used by opposing forces or the enemy to counter attack, weaken forces, and gain information, and so on. People will sometimes get relaxed or forgettable while not in a combat zone or operation area. If this happens it is very dangerous due to the fact that enemies are able to obtain any and possibly all of your sensitive items to gather information or harm you and your unit and
As we know there are many factors that attribute failure in our IC community. Like Kennedy said, lack of communication between collectors is one of them. Kennedy used example of how our nation failed to evaluate the Saddam’s WMD capabilities and it is prime example of failing to share the intelligence between agencies. Kennedy argues that collectors have considerable discretion of what information will get passed to analysts and sometimes vital but seemingly irrelevant information could be the key information that completes the mosaic.
A lot of the main structure of the Army is placed on accountability. For instance, leadership’s accountability of where a soldier is at any given time, or a
The information and images accumulated can be in turn be used within the intelligence community and shared with foreign law enforcements organizations providing them a snapshot of what was discovered to assist the United States with stopping
Intelligence was known about the terrorist locations. The article by Jones brings attention to the laws of government agencies sharing information between themselves. In reference to the 9/11 Commission Report it was recommended that more sharing of information take place. Suggesting that this would allow agencies to work together more cohesively. Allowing a larger spectrum to be aware of important aspects of watched individuals, groups, cells, militia, etc. The author, Jones, outlines advantages of agencies both local, state, and federal working together. He puts insight on the history of sharing information before 9/11, and after September 11th. The changes that were brought as a result of the attacks are reviewed as well. Each individual intelligence agency can be applauded for the information they have individually collected. The information is sorted, stored, and then becomes what? A notch in the belt of the agency? A job well done of sorts. “The 9/11 Commission Report recommended there be “unity of effort” in the sharing of intelligence” (Jones, 2011).
agents. They didn’t contain the contents of any U.S. military plans, or of any conversations between U.S. or foreign officials...But it will hardly surprise the organized terrorist groups, which already go to great lengths to avoid being monitored." (Cassidy 1). Snowden's revelations have only brought us alarming news on United States espionage upon their own people, which have individual rights to express what they wish to by the often cited First Amendment, even though they are being constantly surveyed upon sites such as Facebook and Yahoo where personal information is wholly visible by the government, even in the presence of privacy policies. Their logging of phone calls also puts many Americans at a severe risk of being targeted or put on further watch for choice words, and will not work on the intended, true terrorists to the country, as they do not use public communications system, at least not U.S. based ones. Even for the public, one will not have a phone call used for them as evidence unless it was recorded by a third party and it hints at their connection to a crime, disproving its pragmatic usage, even in higher
After the horrific attacks of 9/11, the U.S. Government created the Department of Homeland Security, which then created over 220 different organizations and agencies to combat terrorism and collect intelligence. These agencies and organizations receive orders and directions from the National Intelligence Agency, and employees over 850,000 government employees with an approximate annual budget of $100 million. With a large annual budget and multiple employees working domestically and with foreign policy, the intelligence function has changed dramatically over the last decade and a half. Foreign governments have scrutinized the National Intelligence (NI) community for monitoring foreign militaries, and their government’s intentions
The CIA and the National Security Council (NSC) have a long track record of using technology to intercept and communicate possible terrorist threats to officials. However, after the Cold War, cuts were made in national security funding and consequently diminished the CIA ability to track and
Unlike Yoshikawa, Kuehn was not in a position where he needed to lay low and attract attention. Kuehn threw lavish parties at his large home and invited military officers to these parties and gleaned information from casual conversation. He was a retired doctor, an aspiring Hawaiian historian, and an inventor. Through Kuehn’s many stories over any topic, the community started to like him, which made blending in where a Japanese man would have been unable to easier (Bombs Over Pearl Harbor, 2003, p. 42-43; Jamison, 2014; "World War II, n.d.).
All US services utilize airpower to sustain the three pillars of the 2014 QDR : protect the homeland; build security globally; and project power and win decisively. There are many ways the services provide airpower support, but this paper only touched on one for each pillar. For the protection of the homeland, cyber security was the way that was shown. A current example of the importance of cyber security is the Office of Personnel Management (OPM) data breach. This breach allowed the theft of personal information, including but not limited to social security numbers, belonging to millions of Federal employees, their spouses, and others. For the pillar of building global security, the support of our allies and partners was the method
Although sensitive items of restricted nature may not disclose information of high value, items and information obtained from being unsecured can cause adverse effects impacting mission success to include compromised routes, vehicle information or sensitive items used for personal protection. Any and all information obtained by any means can be used to put together a larger pictures of a units operations. Leaving the units operational security compromised.
If the information was to be in any relation to terrorism, any US citizen would understand the severity especially after the 9/11 event. But without any relation to any terrorism, it basically means that the US government is spying. This is a controversial topic that brought confusion.
There are four occurrences in military history where the military itself became affected by the failure of technology and training and the vast amount of money being spent, created the military to not reveal either the whole operation or specific aspects of the operation to the public. Examples of this would be three operations and one agency. First operation is the USS Scorpion recovery second, Glomar Explorer recovery operation and the Eagle Claw operation. The agency that also exhibited these different aspects was the National Reconnaissance Office (NRO). These different operations and agency provide an example of either of the reasons why the military was not willing to reveal these operations or agency to the
Survival time is not measured instantaneously. In other words, one has to wait for the