After the resignation of Tenet, who submitted as his official reason for departure the desire to spend more time with his family, his spokesman noted that "no one in the U.S. government was more aggressive in calling attention to and dealing with the threat of terrorism prior to 9/11 than was George Tenet.' The CIA's counterterrorism budget increased 50% between fiscal 1997 and fiscal 2001, while staffing went up 60%."
This ultimately resulted in an increased level of effectiveness during those years of assessing and averting terrorist plots, highlighted by the 1999 foiling of al Qaeda's millennium hijacking plan. Here, a carefully synchronized set of airliner takeovers was to strike at prominent and highly populated points within the U.S. Or utilize the hostages onboard to negotiate for the release of previously captured terrorists. However, during Clinton's final month as president, '"in the period between December 1999 and early January 2000, [The 9/11 Commission] read, 'information about terrorism flowed widely and abundantly.'"
The report goes on to indicate that, due to widespread fear that terrorists, in particular those associated with the well-established threat of Osama bin Laden's al Qaeda terrorist network, would seek to take advantage of the possibility of a Y2K computer glitch meltdown, agencies were encouraged to share information and to seek improvements in the defense of information technology to hacking vulnerabilities.
The ultimate outcome would be the disruption of a potentially catastrophic terrorist plot with a capacity to inflict exponentially more damage and casualty than would be manifested on September 11th. In addition to strengthening encryption methods, raising security walls to improve the prevention of infiltration to government systems and diminishing the vulnerability of government or airline transmissions, the intelligence community would also utilize its access to cellular transmission interception technologies not just to trace the correspondences of terrorists but also to use cellular devices as beacons for the relaying of a wealth of data. Following a 1999 hijacking in India by Islamic Pakistani nationals, the international intelligence community kicked these technologies into high gear and experienced what should likely today be considered the greatest preventative success yet experienced with respect to technology and the threat of terrorism.
Quite to the point, officials in the United States and Pakistan were able to connect a primary suspect on the ground named Latif with a series of communications that would ultimately connect all of the dots. As a result, "part of the design began to unravel on December 25, a day after IC814 was hijacked, when the intelligence agencies intercepted a message from the hijackers in Kandahar to their source in Mumbai. The hijackers were keen to know from their friends in India about the fallout of the hijack. The call was made on a mobile phone an d it was subsequently found that several calls were made form the same number to Kathmandu and Karachi in the preceding two days. Information gathered from these dalls led the police to zero in on Latif, who in turn was updating a source in Karachi on every aspect of the fallout, from the Government reaction to public sympathy towards the hostages."
Once officials were led to Latif, they were able to disarm a plot that threatened to put as many as twelve hijacked commercial flights into the air with the intent of being used as missiles against strategic targets. The offshoot would be some template for combating terrorism. Of course, it bears noting that in addition to the fact that a change in administration and leadership philosophy in the United States would make it more vulnerable by the approach of 9/11, it may also be suggested that the terrorist cells had learned much from both their previous successes and from the foiled Millennium Plot. Namely, the duration of time which had passed between the hijacking and the intent to strike a target was far too great, allowing intelligence and defense agencies to make the necessary connections to intervene. With 9/11, the terrorists would not repeat this error, acting quickly to coordinate the hostile takeover of four airliners and approach targets faster than a decision could be reached on how to address the situation.
This would highlight the advancement made by terrorists in the sophistication and focus of such attacks. Thus, it simultaneously highlights the pressing need for advancements in technology and the intelligent application of such technology to the prevention of terrorism. Surveillance issues in particular have occupied focus, with the apparent ease of permeation of U.S. borders and public spaces such as airports of known terrorists well recognized...
Local Police Response to Terrorism The Council of State Governments The council of State Governments is a body of representatives of all states, Territories within the ambit of the U.S. And Commonwealth of Puerto Rico. It is an organization that provides vital data and statistics towards excellence in running the matters of the state. It seeks to enable the three apex institutions, viz., legislature, judiciary and the executive with intellectual inputs with
Impact of Potential Change Factors The potential change factors that both industries share is offshore production that is drastically re-shaping their value chains while also changing the structure of many industry participants from a supply chain standpoint. The outsourcing of tool manufacturing to India is forcing investment in quality management and compliance (Dangayach, Deshmukh, 2006) while in the high tech industry the change factors of Chinese manufacturing (Albrecht, Morgenstern, Xia, 2008)
Law comm. tech Innovations in Database Communication Technologies for Law Enforcement The proliferation of computer, digital and web technology have all had a significant impact on how civil and public administration functions are performed. The ability to engage in real-time communication through an array of media, the opportunity to access enormous databases of information from the field and the capacity to capture sound, video, photo and other data all have enhanced productivity,
Rapid innovations in technology, particularly telecommunications and transportation, have accelerated the globalization process in recent years, and a number of positive outcomes have been associated with these trends, including increased levels of international commerce and improved cross-cultural understanding and communications. Despite these significant positive outcomes, the same globalization processes have also further exacerbated existing economic and political inequalities between developed nations such as the United States and the United Kingdom.
Galileo Product Idea Description Most technical innovations in any field have been combinations or amalgams of software and hardware applications that were never meant to be used together. However, they have nevertheless come into existence because someone decided to marry up these unimagined elements in combination with each other. To midwife these projects to full fruition, startup money is needed. As usual, the military is the usual maternity ward for such applications and
In 1990, Africa had 2% of the world's telephones, but in 2000 it had only 0.8%. (These data, taken from International Telecommunications Union tables, represent fixed lines, not wireless, and there are now more mobile telephone subscribers in Africa than fixed-line subscribers. 3 Nevertheless, with about 12% of the world's population, Africa is far behind in per capita telephone subscribers.) (Hundley, Anderson, Bikson & Neu, 2003, p. 126) More specifically, even
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now