911 Commission Recommendations

Great Essays
1. In your text book, the 911 Commission Report suggested several reforms for restructuring government in the wake of 911 and has listed ten (10) recommendations. In this Question, you are to discuss each of the recommendations and were the recommendation’s successful or not. Do we need to make changes here and where to expand on these recommendations? The 9/11 Commission Report suggested several reforms for restricting government in the wake of 9/11 and listed ten recommendations as followed.
-Create a National Counterterrorism Center In the 2011 911 commission report progress, the Department of Homeland Security, the National Counterterrorism Center and other federal agencies have analyze travel-related data to understand travel patterns
…show more content…
In 2004 when the 9/11 commissions recommended a major change in the Intelligence Community which resulted in creating a director for the DNI. Former President Bush signed executive orders in August 2004, which soon after in February 2005, the president announced that John D. Negroponte would be the first director of the DNI. With the reform of the new commission and director, this lead to the mission, vision and goals of the DNI. The mission are to lead intelligence integration and forge an Intelligence Community that delivers the delivers the most insightful intelligence possible. The vision is a nation made more secure because of a fully integrated Intelligence Community. The goals are integrate intelligence analysis and collection to inform decisions made from the White House to the foxhole, drive responsible and secure information-sharing, set strategic direction and priorities for nation intelligence resources and capabilities, and advance cutting-edge capabilities to provide global intelligence advantage and much more. To this day, the recommendations from the 9/11 commission report have proven to …show more content…
The main goal of the CATIC was designed to combat terrorism with this statewide intelligence system. It linked federal, state, and local information services in one system and divided operational zones into five administration areas (White 347). In 2002, the Department of Justice designed this program to train intelligence analysts to operate within civil rights guidelines and to use information in a secure communication systems. The pros of this system combined state and local law enforcement to access types of information coming from various police agencies. The information would correlate and be organized by analysts that are looking for terrorism trends. The information gathered would be from computers and other automated devices. This would lead to the downside of CATIC system because it used a synthesizing process. It would combine public information with data on criminal trends and possible terrorist activities which would process trends outside of jurisdiction. This lead to a halt because critics stated that the CATIC collected and maintained records on several individuals and groups that had nothing to do with terrorism (White 347). The system even gathered and stored information on political dissidents who engaged no criminal activity. Critics are afraid that information sharing may lead to massive

Related Documents

  • Great Essays

    Robert Hanssen Psychology

    • 2123 Words
    • 9 Pages

    Robert Philip Hanssen, born April 18, 1944 to police officer Bob Hanssen, was one of the most damaging spies in United States history (Deep Inner Conflicts). Raised in Chicago, he would later attend Knox College where he received an AB degree in Chemistry. Next, in 1966, he would attend Northwestern University. Initially studying to become a dentist, he would decide to instead pursue a degree in Accounting and Information Systems. While in college, he would also take classes on the Russian language.…

    • 2123 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    9/11 Commission Report

    • 714 Words
    • 3 Pages

    Pages 6-7, in the 9/11 Commission Report foretell four different stories. For instance, the pages have a brief description of what occurred, during the four flights, those being: Flight 11, 175, 77, and 93. All four of these planes stories are told in a timeline, “… Showing the simultaneous histories of the four hijacked airplanes as they began and completed their horrendous missions” (Hill and Wang 6). It is important that they are being told on a timeline because it allows the reader to get a sequential understanding of what was occurring by the illustration and the textual literacy telling the story.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Central Integrity Agency is a body that is responsible for the matters related to foreign intelligence in the United States. Its Director is nominated by the president, and thus it merely conducts its activities and its mission as directed by the president. Therefore the real work CIA is to identify, collect, evaluate, analyze, and broadcast foreign intelligence to serve and assist the American president and his senior government policymakers primarily on the issues related to the national security. The three characteristics of information security (CIA) are availability, integrity, and confidentiality. In this question, I will discuss availability as personal information security of my choice.…

    • 104 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    CIA Website Overview

    • 1464 Words
    • 6 Pages

    Sage Gurney WWW.CIA.GOV The website, www.cia.gov, is all about the Central Intelligence Agency. On the website, it states that their “primary mission is to collect, evaluate, and disseminate foreign intelligence to assist the president and senior US government policymakers in making decisions relating to the national security.”…

    • 1464 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Since 1947, the President of the United States along with members of Congress has received a special intelligence report called the National Intelligence Estimate (NIE). The NIE is a document that is written for those who are the policymakers within Congress to give them an understanding or estimate of what is going on in a particular country, region or better understanding whatever is needed to be answer by the Intelligence Community (IC). This document allows for the policymakers and analyst within the Intelligence Community to collaborate to achieve and focus what is needed to be analyzed accordance with the National Intelligence Council (NIC) on the behalf o the President. The purpose of the NIE is to provide not only an intelligence…

    • 1021 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The threat of espionage has not ceased since the end of the cold war. Espionage is harmful to anyone that has confidential information, which everyone has. From credit card information to scientific breakthroughs. Information is paramount for governments so that they can make their decisions.…

    • 134 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    I have a strong argument that the government should not be able to invade my privacy and look at my information on my phone or other people’s phones. Spying on people’s phones is an invasion of their privacy. Even though it maybe useful for spying for terrorist reasons itś still wrong to spy on someone. Spying on someone is invading their personal space or their privacy. Gathering data from citizens’ cell phones, even if only briefly, may violate the Constitution.…

    • 422 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This essay will address the National Intelligence Estimate (NIE). First I will discuss the process of producing and NIE which will identify key shortcomings that will be addressed in detail. This key shortcomings will help explain why the NIE is an imperfect process with an imperfect product. The National Intelligence Estimates (NIE) is designed to provide officials such as our senior civilian and military policymakers with more in-depth information on some international topic of interest and likely course of future events (Johnson, p. 333).…

    • 1046 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Mumbai Attack Failure

    • 1047 Words
    • 5 Pages

    It lacks any effective direction or control over the various intelligence agencies and as such there is no systematic tasking of agencies or evaluation of their performance. This is due to the fact that there is no institutionalised system for coordinated action or information sharing. Its product also does not receive the attention and intelligence agencies tend to bypass JIC by passing important intelligence to the highest level. The issue is further complicated due to turf issues since each intelligence agency focuses on a particular realm. Failure of Intelligence Cycle 1.…

    • 1047 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Terrorism Prevention Plan

    • 858 Words
    • 4 Pages

    Introduction By nature of the term, prevention cannot happen without prior knowledge. When combating the terrorist threat, a government’s greatest asset is a deep understanding and knowledge of the threat. While there are many ways knowledge is obtained, three places the Department of Homeland Security can look at to improve the intelligence network of the nation overall through better intelligence interpretation are within cyber risk, border response, and internal management restructuring overall. Cyber Risk Responding effectively to attack as it happens is important, but prevention saves both lives and time.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this document, there were seven mission objectives outlined in which these objectives were driven by intelligence. The first is Strategic Intelligence. Strategic intelligence not only provided intelligence on enduring issues, but is also a part of the national security decision-making process (Intelligence, 2014). The second is Anticipatory Intelligence. This objective is to use intelligence to predict and anticipate any type of attack against the United States.…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    New Technologies in Counterterrorism Since 9/11 In response to the terrorist attacks of September 11, 2001, the U.S. Government initiated efforts to combat terrorism and irregular adversaries. While terrorism has long been identified as a national security threat, it was no longer viewed as a law enforcement problem, but as a military problem. The Clinton Administration had used the military in retaliation for attacks by international terrorists, but the majority of counterterrorism funding was allocated to the Department of Justice for law enforcement and investigative efforts. After 9/11 the economic emphasis on addressing terrorism shifted to the Department of Defense.…

    • 1195 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Assignment 1 Explain the goals of Confidentiality, Integrity, and Availability with respect to Systems Security. Confidentiality, Integrity and Availability are also known as the CIA triad. This triad is used a as guide for computer and information security in many organizations. Confidentiality is privacy.…

    • 1575 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Introduction Army Intelligence also known as the Military Intelligence Corps, is a discipline in which exploits a number of information gathering and analysis tactics to provide direction and purpose to commanders in support of their conclusions. Army Intelligence was founded in 1775, but it wasn’t until 1885 in which the Army established the Military Intelligence Division (MID). Army Intelligence has been a valuable asset to what is acknowledged as the Intelligence Community (IC). Although Army Intelligence is a key asset within the IC, they are beginning to lose what has made them a valuable asset to the IC. In order for the Army Intelligence corps to improve, they must revitalize their Human Intelligence (HUMINT) program, military intelligence…

    • 1396 Words
    • 6 Pages
    Superior Essays