Commission Report
There's a substantial gap between the notions presented by the 9/11 Commission on inadequate imagination and its suggested solutions. It's unlikely that the primary modifications can help create analytical solutions in a limited amount of time. The advancement of national intelligence centres is really a pricey solution and idea that rests on impractical belief in the impartiality and just approach of the policymakers. The requirement of a bigger and much more diverse community of experts may, perversely, lower the standard of their work. And there's really no point in anticipating that the DCI could be more in a position to encourage imagination when he's no longer the principal intelligence consultant (Rovner and Long, 2005).
More realistic and logical plans within the Commission report are directly and indirectly proportional to the imagination problem; included in this are growing the FBI's intelligence abilities and mandating standardized DOD and DHS risk checks. These plans have to be structured around the existing assets and really should offer some form of advantage in the long run. One of the more sensible recommendations was to declassify the overall intelligence budget. This not only made sense in the long run but was also highly relevant to eradicating the loopholes in the system that led to failure. Ironically, it was the one recommendation that the Congress rejected (Rovner and Long, 2005). In this paper we will discuss some of the reasons that led to and have thus influenced the security protocols in the United States in light of the Commission Report of 9/11.
Overview
The 9/11 Commission Report continues to be distinctively influential within the debate concerning the organization of intelligence within the United States. A lot of its recommendations were integrated into the lately passed legislation which will enact probably the most prominent and expansive changes towards the intelligence community in the past 6 decades. Within this section of the paper, we analyze the ideas of intelligence failure presented through the Commission Report, and examine how carefully the suggested reforms are associated with individualistic and standardized ideas. There are two primary logics that we present: first, the ideas of failure have not been examined in detail and can be said to be underdeveloped; second, the suggested reforms are mainly unrelated towards the hypothesized reasons for failure. Therefore, the big business reforms presently underway are implausible to enhance intelligence performance considerably (White, 2004).
The 9/11 Commission discovered that the intelligence community had to basically endure deficiencies within the institutional imagination prior to the September 11 attacks. This was the reason why it became impossible for many experts and decision-makers to determine the terrorist threat in a precisely and timely manner. Had they better gauged and realized the risk of attacks from al Qaeda, they might have been able to take steps to enhance warning intelligence. More imagination may also have assisted experts analyze and identify the important network of terrorists that designed, organized and performed the breaches and attacks on 9/11. Quite simply, the intelligence community was unable to "connect the dots," because it wasn't adequately imaginative (White, 2004).
Finally, based on the conclusions of the Commission Report, it is safe to say that the higher the level of imagination, the higher would be the stimulated and aggressive counter-terror guideline. This would also result in a much more vigilant and efficient homeland security system. The uncertainty of designs and structures to fight against the terrorist networks on a national and global scale throughout the Clinton and Bush administrations indicates the threat never was fully understood. When it comes to homeland security, there is a more expansive distribution of CIA risk assessments confirming that terrorist agents might have introduced a lot more focus on the requirement for permanent alterations in domestic airport terminal and air travel security methods than ever needed before (Whitney and Trosten-Bloom, 2003).
Even though some agencies were worried about a potential hijacking incident before September 11, they didn't embark on the use of standard methods developed through the years to protect against an unexpected attack. Particularly, they didn't evaluate how terrorists would use a plane like a weapon, or describe the obvious indications that could have possibly highlighted the design behind this kind of a terrorist operation. The intelligence community didn't deem it important to, for example, assign analytical teams to act as terrorists. These "red teams" may have stimulated creativity and notified the city towards the features of and destruction from the threat (Whitney and Trosten-Bloom, 2003).
Remarkably, the Commission Report didn't clearly connect some of its plans for this theory of failure. Regardless of the focus on imagination within the Commission's rationalization of everything that...
9/11 and the IRTPA Under the National Security Act of 1947, the Director of Central Intelligence (DCI) was charged with the task of coordinating all national intelligence activities within the U.S. government. One major reason for this change was the failure of coordination and analysis across the intelligence agencies in predicting the attack on Pearl Harbor in 1941. Indeed, so glaring were the failures to 'connect the dots' in determining the
Problems and risks related to contracted a new company relate both to cost, safety measures and legal liability. The primary consideration is cost, as this is the major problem related to the issue mentioned above. The first requirement for the new company would then have to be a cost that is as close as possible to the price to date charged by Walkers Ausgas before the increase. Being a transport
Breach of Faith Over the course of twenty-two years, from 1979 to 2001, Robert Hanssen participated in what is possibly the most severe breach of national intelligence in the United States' history. Through a combination of skill and sheer luck, Hanssen was able to pass critical information from his job at the FBI to Soviet and later Russian intelligence agencies, information that may have contributed to the capture and execution of
66). Furthermore, social software will only increase in importance in helping organizations maintain and manage their domains of knowledge and information. When networks are enabled and flourish, their value to all users and to the organization increases as well. That increase in value is typically nonlinear, where some additions yield more than proportionate values to the organization (McCluskey and Korobow, 2009). Some of the key characteristics of social software applications
Studying a sample of 153 top commercial Web sites directed at children under 13, the CME found that COPPA has spurred changes in Web sites' data collection practices. Web sites had limited the amount and type of information (e.g., name, postal address, phone number, age) collected from children, and there was a three-fold increase in the posting of privacy policy information explaining sites' data collection practices. A few sites
This is to note that "Trinidad and Tobago alone account for 80% (1st quarter 2004) of all U.S. LNG imports, up from 68% in 2002. Therefore, any incident involving an LNG tanker along the Caribbean routes could harm not only U.S. energy security but also the economies of the Caribbean islands, affecting tourism and other industries." (Kelshell, 1) Such a trajectory has all the markings of an Al-Qaeda styled
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now