Verified Document

9/11 And The Failure Of Imagination Essay

Shared Information in Terrorist Attacks Many press reports, and to some extent the 9/11 Commission Report, referred to the failure to share information as one reason the U.S. was unable to prevent the terrorist attacks of 9/11/01.

Just days after the terrorist attacks in Paris by self-professed operatives of Al-Qaeda in Yemin, this discussion could not be timelier or more pertinent. Once again, the pivotal significance of integrated counterterrorist intelligence -- coupled with the inescapable issue of the scope and magnitude inherent in anti-terrorism -- was made tragically salient.

Cite at least two specifics that point to this being true or why not.

After six months of escalating terrorist chatter, a meeting was held on July 5, 2001, at which "representative from the Immigration and Naturalization Service (INS), the FAA, the Coast Guard, the Secret Service, Customs, the CIA, and the FBI met with Clarke to discuss the current threat," but attendees recall being told not to disseminate the threat information that was disclosed at the meeting ("Blinking Red," 2007). One notable exception was a National Security Council (NSC) official, who interpreted the cautionary statement in this manner: "attendees were asked to take the information back to their home agencies and 'do what you can' with it, subject to classification and distribution restrictions ("Blinking Red," 2007). Moreover, even after explicitly requesting a summary of the information presented at the meeting that could be shared with field officers, an INS representative reported that no such document was ever provided ("Blinking Red," 2007).

The severity and number of threats reports that the intelligence community received during the summer of 2001 were "unprecedented" yet an enormous chasm had widened between domestic and foreign threats -- and it was into this chasm that the September 11 attacks would plummet ("Blinking Red," 2004). While foreign intelligence agencies were focused on threats to U.S. interests in international locations, the domestic intelligence agencies were focused on domestic threats from sleeper cells. In an infamous failure of the imagination noted by the 9/11 Commission, intelligence agencies were by and large not conceptualizing threats from foreign invaders who had just recently "infiltrated into the United States" ("Blinking Red, " 2004). Clark's take on the July 5th meeting was retrospectively quite different from many of the attendees, as he summarized the steps taken to alert domestic agencies, including the FAA, to the possibility of an attack on the U.S. In an email he sent to Rice on September 15, 2001. Yet the FAA did not mandate any new security measures, and in briefings on CD-ROM presented to airport authorities and air carriers, noted that suicide hijackings were possible, but that "fortunately, we have no indication that any group is currently thinking in that direction" ("Blinking Red," 2004).

Discuss at least two information-sharing models that have been recommended since then.

Following 9/11, the FBI belated adopted a much-needed new paradigm that moved the agency from counterintelligence focused on particular cases to threat-based, intelligence-led counterterrorism (Mueller, 2011). If any one attribute of this shift stands out, it is the elevated focus on information sharing (Mueller, 2011). Changes have been felt across all facets of the Federal Bureau of Investigation, and "these changes have transformed the Bureau into a national security organization that fuses traditional law enforcement and intelligence missions" (Mueller, 2011). The national security organization model the FBI crafted after 9/11 is driven by threat, a shift that fosters the prioritization of intelligence collection and enables a broader definition of threat. The Bureau's model is based on interconnectivity through joint operational initiatives, greater overseas presence, and the adoption of information sharing technology systems. Within one year, two thousand additional agents were added to national security programs. Control and management of counterterrorism operations was centralized and augmented at Headquarters to avoid the segregation of information across 56 individual national field offices, a situation further improved through the creation of a Field Intelligence Group (FIG) at each field office. The National Security Branch (NSB) was established in 2005 to combine "the missions, capabilities, and resources of all the national security components of the Bureau -- counterterrorism, counterintelligence, intelligence, and weapons of mass destruction.

In order to implement the new functions and emphases enabled by the restructuring, the Bureau created a tool using balanced scorecard methodology -- the Strategy Management System (SMS). In addition to gauging the progress of the Bureau's transformation, the SMS communicates the FBI strategy, the priority of initiatives, and the role of each component in pursuit of strategy. The intelligence cycle is the core of FBI strategy. By 2007, the Bureau established a Strategic Execution Team (SET) in response to recognition that intelligence was not yet well integrated into FBI operations. SET identified two barriers to the transformation of the Bureau: 1) The integration of intelligence into field...

In response, the Bureau dedicated resources to the recruitment, training, and elevation of specialists with language and analytical skills necessary to carry out the intelligence cycle critical functions. Moreover, the FIGs underwent standardization designed to increase collaboration between operations and intelligence, and "to provide accountability for intelligence collection, analysis, use, and production" (Mitchell, 2011). To further embed intelligence personnel in operational divisions, SET standardized the role of intelligence by establishing the Central Strategic Coordinating Components (CSCCs). To further promote intelligence sharing and to regularly underscore the Bureau's priorities of "comprehensive domain awareness and network disruptions," Headquarters conducted Strategy Performance Sessions (SPS) with field offices by secure video teleconference (Mitchell, 2011).
Overall, the strategic shifts in the Bureau are characterized by increased coordination, enhanced communication, improved leadership, clearer prioritization, increases in the number and training of human capital resources, and improved collection of intelligence (Mitchell, 2011). A key role of the FIGs is to integrate, analyze, exploit, disseminate, and share intelligence collection (Mitchell, 2011). The Joint Terrorism Task Forces (JTTFs) enable integration of domestic counterterrorism operations with law enforcement at the tribal, local, state, and federal levels (Mitchell, 2011). Similar structures have been established in other countries. For instance, the National Intelligence Model developed by the Crime Committee of the Association of Chief Police Officers and the National Criminal Intelligence Service in the United Kingdom is an integrated system of best practices in intelligence-led policing and law enforcement (Mitchell, 2011). These models make use of a multi-level system that addresses crime at the local level, cross border issues, and serious and organized crime. These models are important because they demonstrate the link between law enforcement and agencies with strong intelligence gathering emphasis.

Summarize some technology available to support these information-sharing models.

Intelligence that is contained in the FBI's intelligence information reports (IIRs) is disseminated through an information technology solution known as the Collection Operations and Requirements Environment (CORE) (Mitchell, 2011). Through CORE, FBI intelligence reporting is standardized and integrated, and synchronization occurs between field intelligence operations and the requirements of the intelligence community (Mitchell, 2011). The standardized production and tracking of intelligence information reports is streamlined through the IIR Dissemination System (Mitchell, 2011). A marked increase in dissemination of IIRs since 2004 by the FBI has boosted the provision of critical information to policymakers, and the intelligence and law enforcement communities (Mitchell, 2011).

An additional information technology system is designed to reduce the amount of time that intelligence analysts spend searching for relevant information, rather than connecting data points and analyzing the steady fire hose of information characteristic of modern intelligence gathering (Mitchell, 2011). The Data Integration and Visualization System (DIVS) consolidates data and increases the breath of information that can be searched and accessed (Mitchell, 2011). The single DIVS interface provides FBI intelligence, criminal investigative information, and data from other missions -- and maintains all applicable regulatory requirements for each data type (Mitchell, 2011). Records from the 11 FBI agencies and critical counterterrorism mission information from other government agency sources are housed in the DIVS (Mitchell, 2011). Development of the DIVS is ongoing as functionality is increased and additional datasets are integrated and tools are made to articulate with the platform (Mitchell, 2011). Since the DIVS is not a legacy platform, it will continue to provide opportunities for tool integration through the Bureau, partners in the intelligence community, and private industry (Mitchell, 2011).

Discuss what you think would be the most effective information sharing model to help prevent terrorist attacks

The information-sharing model that is integral to the paradigmatic changes within the Federal Bureau of Information contains a number of elements that demonstrate the difficulty of making cultural shifts and individual and organizational change. The FBI model, in concert with the recommendations of the National Criminal Intelligence Sharing Plan (NCISP), lay out an integrated, comprehensive, and dynamic map to a robust information-sharing model designed to prevent terrorist attacks. At the 2002 International Association of Chiefs of Police (IACP) Criminal Intelligence Sharing Summit, the Global Justice Information Sharing Initiative (Global) Intelligence Working Group (GIWG) was established. Interestingly, most of the recommendations from that group are described as national efforts -- national intelligence plans -- which is somewhat surprising given that the origination of the group was an international…

Sources used in this document:
References

Mueller, R.S. III. (Director, Federal Bureau of Investigation). Ten years after 9/11 are we safer? Statement Before the Senate Committee on Homeland Security and Governmental Affairs, Washington, D.C. On September 13, 2011. Retrieved from http://www.fbi.gov/news/testimony/ten-years-after-9-11-are-we-safer

National Criminal Intelligence Service (NCIS). 2000. The National Intelligence Model.

Retrieved from http://www.intelligenceanalysis.net/National%20Intelligence%20Model.pdf

The National Criminal Intelligence Sharing Plan, U.S. Department of Justice (2005). National Criminal Intelligence Sharing Plan.
9/11 Commission Report. The system was blinking red. [Chapter 8]. (2004, July 27). 9/11 Commission. Retrieved from http://govinfo.library.unt.edu/911/report/911Report.pdf
9/11 Commission Report. How to do it? A different way of organizing the government. [Chapter 13]. (2004, July 27). 9/11 Commission. Retrieved from http://govinfo.library.unt.edu/911/report/911Report.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorist Attacks of 9/11, the Security of
Words: 963 Length: 3 Document Type: Essay

terrorist attacks of 9/11, the security of the United States of America has been transformed into the utmost priority of the presidential administration. Aside from the political rules however, more and more individuals place an increased emphasis on issues of security, especially the prevention of terrorist attacks. And in this setting of increasing focus on terrorist attack prevention, the literature in the field has also expended. Numerous books have been

Critical Thinking in the Aftermath of 9/11
Words: 1479 Length: 4 Document Type: Term Paper

Critical Thinking for Homeland Security The capacity of a government to protect its citizens pivots on the ability of its leaders and high-placed specialists to think critically. Few times in history point so clearly to this principle than the 9/11 disaster. In 1941, the same year that the attack on Pearl Harbor occurred, Edward M. Glaser published a book titled, An Experiment in the Development of Critical Thinking. Glaser's practice of

Intelligence and Surveillance Policies and Procedures After September...
Words: 2139 Length: 8 Document Type: Thesis

Many scholars have signified that timely availability of both creative and financial resources leads to effective problem solving. Many scholars have given a great deal of emphasis to the creative aspect of counterterrorism policy making. They assert that policy makers have got to get inside the heads of the terrorists to figure out what they plan to do, what their ideology is and how they are going to execute

Web-Based Failure Mode and Effect
Words: 2226 Length: 8 Document Type: Research Paper

Riff Henry B; Hatzes Nanette M. Bramel; Michael H. "Emotional Intelligence and LD in collage students." Journal of Learning Disabilities. 34:1. pg.66-78. Feb 2000. 10/18/01 This article talks about various aspects of emotional intelligence in regard to college student's life and behavior. It discusses LD-leaning disabilities as well as the measurements of emotional intelligence constructs by means of EQ.The article recommends that for students to have good achievements, then they must

Expression That Has Been Dedicated to the
Words: 2913 Length: 9 Document Type: Essay

expression that has been dedicated to the 2001 terrorist attacks by Al-Qaeda that the United States suffered from on September 11. It won't be incorrect to state that 9/11 proved to be a turning point for the George W. Bush administration and the foreign policy of the United States of America. The events unswervingly led to the United States support for the downfall of Al-Qaeda in Afghanistan where it

New Threats and Law Enforcement
Words: 870 Length: 3 Document Type: Discussion Chapter

New Terrorism How can police and law enforcement agencies best utilize resources to confront this new threat? Briefly describe the important features of "new terrorism" as discussed in the readings. What is "new" about contemporary, international terrorism? Identify the police and law enforcement resources most relevant or essential to the threat of terrorist attacks. Also identify any important gaps between resources and needs. In contrast to the terrorists of the past, the most

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now