Verified Document

Sharing And Terror Attacks: According To The Essay

¶ … Sharing and Terror Attacks: According to the findings of the 9/11 commission or the National Commission on Terrorist Attacks Upon the United States and several media reports, breakdowns in information sharing and failure to combine relevant intelligence are some key factors in the failure to stop the 9/11 terror attacks. Consequently, intelligence gathering and information sharing have become vital components of the U.S. government efforts to fight terrorism. Actually, the first major step for preventing terror attacks is to gather information regarding the operations of the terrorist group. This is followed by sharing the information across the relevant governmental agencies to use the information in preventing the attacks.

Information Sharing and the 9/11 Terror Attacks:

As part of showing the failure of information sharing in the failure to prevent the 9/11 terror attacks, the commission cited several reasons or factors including

Limits on Federal Law:

Many provisions in the federal law had been largely interpreted to restrict the capability of intelligence investigators to communicate with law enforcement officials before the 9/11 attacks. These initiatives also limited the ability of intelligence investigators and federal law enforcement officers to share information that is pertinent to terrorism with the intelligence community. As a result, the limits created a metaphorical wall or obstacle between the intelligence community and law enforcement officials. The figurative obstacle in turn inhibited significant information sharing and coordination to help in preventing the attacks (Thompson, 2003).

Lack of Coordinated Efforts:

The second aspect demonstrating the failure of information sharing in preventing the 9/11 terror attacks is the lack of coordinated efforts across relevant governmental agencies. While these agencies had pieces of information that could help prevent the attacks, the Central Intelligence Agency, Federal Bureau of Investigation, and other law enforcement agencies lacked coordination ("Agencies Failed," n.d.). The agencies had pieces of information that could help unravel the terror plots...

Parts of this document are hidden

View Full Document
svg-one

Congress to develop an information-sharing environment that would offer and promote sharing terrorism-related information across all the relevant governmental agencies through the use of technologies and policy regulations. The two major information sharing models recommended by the 9/11 Commission to help in the war against terror include & #8230;
Policy Regulations:

Under policy regulations initiatives, the commission suggested that the U.S. president should lead nationwide efforts that bring the main national security agencies into the information revolution. In this case, the president should promote and organize the resolution and transformation of the legal, technical and policy issues across these agencies in order to support the creation and development of a trusted information network ("How To Do It?" 2004). This recommendation emanates from the fact that restrictions on the federal law were one of the key factors that inhibited information sharing before the attacks. The elimination of these policy hindrances would enable the national security and law enforcement agencies to share terrorism-related information to help fight against terrorism.

Use of Technologies:

Following the establishment of necessary policy regulations, the second information sharing model is the use of technologies in creating the information sharing environment. As a major concept of the information revolution, the use of technologies should primarily involve the creation of a decentralized network model. Unlike the existing information sharing model structured on an old mainframe, the decentralized network model could help in preventing terror attacks because it supports sharing data horizontally. The decentralized network model in part of the trusted network model that enable national security and law enforcement agencies and officials to share vital information.

Available Technology for Information Sharing Models:

As previously noted, the creation of a…

Sources used in this document:
References:

"Agencies Failed to Share Intelligence on 9/11 Terrorists." Broken Government -- An Assessment

of 128 Executive Branch Failures Since 2000. Retrieved May 17, 2012, from http://www.publicintegrity.org/investigations/broken_government/articles/entry/1017/

Bjelopera, J.P. (2011, June 10). Terrorism Information Sharing and the Nationwide Suspicious

Activity Report Initiative: Background and Issues for Congress. Retrieved from Foreign Press Centers -- U.S. Department of State website: http://fpc.state.gov/documents/organization/166837.pdf
Davis, et. al. (2010). Long-Term Effects of Law Enforcement's Post-9/11 Focus on Counterterrorism and Homeland Security. Retrieved May 17, 2012, from http://www.rand.org/pubs/monographs/2010/RAND_MG1031.pdf
Commission on Terror Attacks Upon the United States. Retrieved from UNT Libraries: CyberCemetry website: http://govinfo.library.unt.edu/911/report/911Report_Ch13.htm
Thompson. (2003, December 8). Intelligence Collection and Information Sharing within the United States. Retrieved from The Brookings Institution website: http://www.brookings.edu/research/testimony/2003/12/08terrorism-thompson
Cite this Document:
Copy Bibliography Citation

Related Documents

Attacks on Pearl Harbor and the World
Words: 8509 Length: 27 Document Type: Term Paper

Attacks on Pearl Harbor and the World Trade Center had similar historical events surrounding each attack. Franklin Delano Roosevelt and George W. Bush used similar policies to combat further attacks and unite the nation The paper highlights the entwined American reactions to the September 11 attacks and the Pearl Harbor attacks. The paper illustrates the similarities in which the over-prevailing backgrounds of each event created reactions to the devastating measures that

Attack on Pearl Harbor Lessons
Words: 973 Length: 3 Document Type: Essay

Yamamoto noted that "the war would continue for several years, our supplies would be exhausted, our ships and arms would be damaged and ultimately we would not be able to escape defeat." (Akira, 1990, pp.133-134). Masaru (1990) added that another difficulty between the two nations was America's attitude during the U.S.-Japanese negotiations on the eve of the outbreak of war. In particular, Masaru points to the hard line position of

Attack of the Butterflies Mark
Words: 1763 Length: 5 Document Type: Essay

The trick is not to focus on any of this, but to focus on preparation and then on the real thing. Do you think you're afraid to talk in front of other people? Guess what? The average person says 15,000 words per day. Unless you're in solitary confinement, those words are spoken to other people, sometimes two, three or more at the same time. You speak to family, friends, fellow

Attack in 2001 Was in
Words: 3433 Length: 10 Document Type: Term Paper

Such an attitude is part cultural clash and part resp0onse to external events, but it fosters a way of thinking that only leads to more conflict over time. U.S. support for Israel is often cited as the key element in explaining Islamic hatred of America, but that is only one element. The way the U.S. fails to understand Islam is another element that creates tension. Also, actions such as those

Attack of 911 Has Posed a Serious
Words: 4017 Length: 10 Document Type: Term Paper

attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to

Attack Causality in Internet-Connected Cellular Networks, Internet...
Words: 796 Length: 2 Document Type: Essay

Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now