Zalmai Azmi, the FBI's chief information officer for the last year realized the need for change, even if it would garner political heat, and decided to implement changes to the organization known as the FBI. The change was related to the growing innovation behind technology and the September 11th attacks. The FBI's technological upgrade has been seen by some as lacking efficacy and reliability. Software dilemmas appear to be piling up. The FBI effectively abandoned its custom-built Internet surveillance technology, code name, Carnivore. This software was designed to read e-mails and other online communications in relation to suspected criminals, terrorists and spies, according to bureau oversight reports submitted to Congress.
To remedy the failure of the software, the FBI decided to switch gears and use an unspecified commercial software to eavesdrop on computer traffic where they would pay ISPs to monitor and wiretap their customers, the customers the FBI believes are criminals. As 2002 and 2003 rolled to a close, a toals of thirteen wiretaps were performed without the use of Carnivore which was later renamed: the DCS-1000. Ironically the FBI once said Carnivore outperformed commercial software when in reality, the use of commercial software put Carnivore out of use. From 1998-2000, Carnivore was only used twenty five times.
Each time the FBI makes a mistake with their software inventions, the amount used to pay for it became disclosed. Experts outside of the field suggested the amount per failed experiment was $6-$15 million. Acts like the U.S. Freedom of Information Act allowed groups like the Washington-based Electronic Privacy Information Center, a civil liberties group, to obtain information on the flunked sofware since it was first known in 2000. Bresson, the director of the FBI defended the FBI's decision to use commercial software to wiretap by stating the need for the government to reduce spending and the commercial software becoming unnoticeable by its subscribers.
The backlash from the public from the new information prompted the FBI to revisit a once hoped for solution to data collection and criminal case management, and resurrect the $'170 million dollar baby. Some experts sympathized with the FBI's inability to match the technological growth of the private sector stating the FBI's at first assumed the private sector technology was subpar. Realizing the technology expanded and evolved beyond its scope is what made the descend all the more difficult said Henry H. Perritt Jr., who led an oversight study of Carnivore in 2000.
One of the reasons the FBI was so disinterested in the technolgy the private sector had intially was the possiblity of having their staff not fufill their orders effectively because of lack of communication through some glitch in the system due to faulty private sector sofware. Donald Kerr, who later became CIA's chief gadget-maker said with enthusiasm that Carnivore was ar better than any private sector software. Ironically private sector software took Carnivore's place. So underestimation of private sector software and overestimation of Carnivore's abilities led to the decline of the overall use of FBI generated software.
FBI Virtual Case File = Total Disaster
2.
Background
Due to the attacks of 9/11, the 9/11 commission felt the need to modernize the FBI information network. The modernization failed due to the need for workers to sign, write, and scan by hand the documents into the system daily. Director Robert Mueller of the FBI himself declared the inefficacy of the system upgrade implementation.Another major contributor to the dissatisfaction was the delay in deploying the system to 100%. Only 10% was used y 2004, a far cry from the initial promise of progress. Along with lack of full deployment, lay the hundred of millions of dollars spent on implementing the upgrade (or lack there of).
People like Mueller expressed the country's need for an upgraded system in comparison to the CIA and the NSA, but saw the inherent futility in the flawed system. A major flaw in the FBI's Trilogy technology upgrade program was its utter lack of security and efficacy. A system needs to be secure for it to possess the ability to allow users to share terrorist related information. The program or Virtual Case File system not only was the lackluster centerpiece of the installment, but also cost a whopping $170 million. After the 9/11 attacks, information sharing became priority. Because of the FBI's IT systems outdated nature, people declared a need for improvement leading to a rush to modernize the netowork and create the flawed Virtual Case File.
Background on the building of the Virtual Case File...
Even thenm once in a while the heads of the more powerful families would meet to work out differences (Meltzer, 1990, pp. 40-41). Still, striking at the mob could not be effected easily by the use of normal investigative methods alone. Indeed, the failure of the FBI to use even those methods in a concerted manner is noted by Kessler (2002), who reports that Hoover usually claimed that the FBI
However, the Academy of Sciences definition of the term enterprise architecture also extends beyond mere IT architecture, although such architecture will certainly support the Academy's definition. This definition denotes "a detailed characterization of the bureau's goals, tasks, strategies, and key operational processes" (National Academy of Sciences, 2004). These objectives would then be facilitated by IT solutions it implement them. One of the most important lessons learned in this particular case
Regardless of these facts, the media failed to put arguments such as these on the front page of the paper because of the control the Administration had on the media channels at the time. It is rather difficult to say the extent to which the independent or small town media actually covered the stories, with its details and discoveries. The internet search can prove more useful, but for the aim
Introduction The USS Cole Bombing in October 2000 was a prelude to the intense focus on the spread of weapons of mass destruction (WMDs) that the FBI took up in earnest one year later in the wake of and in response to 9/11. With the killing of several crewmen and the wounding of several more, the USS Cole Bombing was in reality just one more terrorist incident in an already growing
Criminal Justice Issues Since there is no official legal definition of sexual homicide, therefore sexual homicide cannot be truly characterized as criminal behavior. Reaction Although there is no specific legal definition for sexual homicide, homicides that are listed as "criminal" include the killing of humans by either murder or manslaughter, so a closer look at what "sexual homicide" really refers to is warranted. In the book Sexual Murder: Catathymic and Compulsive Homicides, Louis
FBI vs. Apple in Relation to the Patriot Act America is divided over the tradeoff between personal privacy and security needs. The focus is, now, on the government surveillance, but there are concerns over how data is being used by businesses. The issue was raised after the federal court was requested to force Apple to assist the FBI to unlock one of the phones used by a suspect in the terrorist
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now