Sharing And Terror Attacks: According To The Essay

PAGES
4
WORDS
1198
Cite

¶ … Sharing and Terror Attacks: According to the findings of the 9/11 commission or the National Commission on Terrorist Attacks Upon the United States and several media reports, breakdowns in information sharing and failure to combine relevant intelligence are some key factors in the failure to stop the 9/11 terror attacks. Consequently, intelligence gathering and information sharing have become vital components of the U.S. government efforts to fight terrorism. Actually, the first major step for preventing terror attacks is to gather information regarding the operations of the terrorist group. This is followed by sharing the information across the relevant governmental agencies to use the information in preventing the attacks.

Information Sharing and the 9/11 Terror Attacks:

As part of showing the failure of information sharing in the failure to prevent the 9/11 terror attacks, the commission cited several reasons or factors including

Limits on Federal Law:

Many provisions in the federal law had been largely interpreted to restrict the capability of intelligence investigators to communicate with law enforcement officials before the 9/11 attacks. These initiatives also limited the ability of intelligence investigators and federal law enforcement officers to share information that is pertinent to terrorism with the intelligence community. As a result, the limits created a metaphorical wall or obstacle between the intelligence community and law enforcement officials. The figurative obstacle in turn inhibited significant information sharing and coordination to help in preventing the attacks (Thompson, 2003).

Lack of Coordinated Efforts:

The second aspect demonstrating the failure of information sharing in preventing the 9/11 terror attacks is the lack of coordinated efforts across relevant governmental agencies. While these agencies had pieces of information that could help prevent the attacks, the Central Intelligence Agency, Federal Bureau of Investigation, and other law enforcement agencies lacked coordination ("Agencies Failed," n.d.). The agencies had pieces of information that could help unravel the terror plots...

...

Congress to develop an information-sharing environment that would offer and promote sharing terrorism-related information across all the relevant governmental agencies through the use of technologies and policy regulations. The two major information sharing models recommended by the 9/11 Commission to help in the war against terror include & #8230;
Policy Regulations:

Under policy regulations initiatives, the commission suggested that the U.S. president should lead nationwide efforts that bring the main national security agencies into the information revolution. In this case, the president should promote and organize the resolution and transformation of the legal, technical and policy issues across these agencies in order to support the creation and development of a trusted information network ("How To Do It?" 2004). This recommendation emanates from the fact that restrictions on the federal law were one of the key factors that inhibited information sharing before the attacks. The elimination of these policy hindrances would enable the national security and law enforcement agencies to share terrorism-related information to help fight against terrorism.

Use of Technologies:

Following the establishment of necessary policy regulations, the second information sharing model is the use of technologies in creating the information sharing environment. As a major concept of the information revolution, the use of technologies should primarily involve the creation of a decentralized network model. Unlike the existing information sharing model structured on an old mainframe, the decentralized network model could help in preventing terror attacks because it supports sharing data horizontally. The decentralized network model in part of the trusted network model that enable national security and law enforcement agencies and officials to share vital information.

Available Technology for Information Sharing Models:

As previously noted, the creation of a…

Sources Used in Documents:

References:

"Agencies Failed to Share Intelligence on 9/11 Terrorists." Broken Government -- An Assessment

of 128 Executive Branch Failures Since 2000. Retrieved May 17, 2012, from http://www.publicintegrity.org/investigations/broken_government/articles/entry/1017/

Bjelopera, J.P. (2011, June 10). Terrorism Information Sharing and the Nationwide Suspicious

Activity Report Initiative: Background and Issues for Congress. Retrieved from Foreign Press Centers -- U.S. Department of State website: http://fpc.state.gov/documents/organization/166837.pdf
Davis, et. al. (2010). Long-Term Effects of Law Enforcement's Post-9/11 Focus on Counterterrorism and Homeland Security. Retrieved May 17, 2012, from http://www.rand.org/pubs/monographs/2010/RAND_MG1031.pdf
Commission on Terror Attacks Upon the United States. Retrieved from UNT Libraries: CyberCemetry website: http://govinfo.library.unt.edu/911/report/911Report_Ch13.htm
Thompson. (2003, December 8). Intelligence Collection and Information Sharing within the United States. Retrieved from The Brookings Institution website: http://www.brookings.edu/research/testimony/2003/12/08terrorism-thompson


Cite this Document:

"Sharing And Terror Attacks According To The" (2012, May 16) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/sharing-and-terror-attacks-according-to-80048

"Sharing And Terror Attacks According To The" 16 May 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/sharing-and-terror-attacks-according-to-80048>

"Sharing And Terror Attacks According To The", 16 May 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/sharing-and-terror-attacks-according-to-80048

Related Documents

Pineda (2012) noted that the tip was wasted entirely due to communication problems, the failure by the police to follow procedures as well as inadequate means-Factors that together bogged down the Norwegian Police's reaction as well as operation on the emergency following the incident. The Gjorv Report also indicated that the nation's only helicopter in the city of Oslo was unusable since its crew was absent on vacation (Blair,2012). This is

Terrorist Attack on the U.S.
PAGES 21 WORDS 5892

The House rejected an effort to require the withdrawal of the Marines by early 1984, on November 2nd, 1983. And, Senate "Democrats were unable to force a vote on a proposal, introduced on Oct. 26 as SRes253, to replace the Marines with a United Nations, or some other "neutral," force." The primary short-term threat was that Marines had become targets in Lebanon. They were no longer the neutral forces that had

9/11 ATTACKSSecurity Posture of the United States Before and After 9/11 AttacksIntroductionFrom the onset, it would be prudent to note that if there was one thing that the 9/11 terror attacks made clear, it was that the national security of this great nation was inadequate. The fact that terrorists could plan and execute an attack of this nature and scale was a clear indication that the country�s national security apparatus

Homeland Security and U.S. Intelligence Formation of Department of Homeland Security & U.S. Intelligence on Terrorism Definition of Intelligence Rationale for Formation of DHS Effectiveness of DHS Importance of Intelligence & Analysts Research Philosophy Research Methods & Its Limitations Data Collection & Analysis National security has been a major concern for United States in past few decades. However, since 2001, this concern has turn into a serious threat for national security. The given research is performed with the intent

Intelligence, Information Sharing, and the 9/11 Commission Report Intelligence versus information There two terms are fundamentally different for a number of reasons. The reason the terms are different can be decoded by investigating the ‘why’ from the information gathered. According to Lance (2017) the ‘how’ or ‘what’ is not important in decoding intelligence information. The resource needed to produce valued and true intelligence is by understanding why. The sole purpose any entity

Suicide Attackers: Definition of TerrorismIntroduction�Terrorism� and �terrorist� are problematic terms because they are so loosely defined; broadly used to categorize individuals, groups and actions; and increasingly politicized (Dombrowsky, 2005). Without a clear definition of terrorism and what constitutes an act of terror or one to be a terrorist, the usage of these terms should be discouraged, as there are other terms that can be better applied (Britton, 2005). The assumptions