Preventing Surprise Attacks


Book Description

Posner discusses the utter futilty of this reform act in a searing critique of the 9/11 Commission, its recommendations, Congress's role in making law, and the law's inability to do what it is intended to do.




Blinking Red


Book Description

After the September 11 attacks, the 9/11 Commission argued that the United States needed a powerful leader, a spymaster, to forge the scattered intelligence bureaucracies into a singular enterprise to vanquish AmericaÆs new enemiesùstateless international terrorists. In the midst of the 2004 presidential election, Congress and the president remade the postûWorld War II national security infrastructure in less than five months, creating the Office of the Director of National Intelligence (DNI) and a National Counterterrorism Center (NCTC). Blinking Red illuminates the complicated history of the bureaucratic efforts to reform AmericaÆs national security after the intelligence failures of 9/11 and IraqÆs missing weapons of mass destruction, explaining how the NSC and Congress shaped the U.S. response to the 9/11 attacks. Michael Allen asserts that the process of creating the DNI position and the NCTC is a case study in power politics and institutional reform. By bringing to light the legislative transactions and political wrangling during the reform of the intelligence community, Allen helps us understand why the effectiveness of these institutional changes is still in question.




Intelligence Guide for First Responders


Book Description

This Interagency Threat Assessment and Coordination Group (ITACG) Intelligence Guide for First Responders is designed to assist state, local, tribal law enforcement, firefighting, homeland security, and appropriate private sector personnel in accessing and understanding Federal counterterrorism, homeland security, and weapons of mass destruction intelligence reporting. Most of the information contained in this guide was compiled, derived, and adapted from existing Intelligence Community and open source references. The ITACG consists of state, local, and tribal first responders and federal intelligence analysts from the Department of Homeland Security and the Federal Bureau of Investigation, working at the National Counterterrorism Center (NCTC) to enhance the sharing of federal counterterrorism, homeland security, and weapons of mass destruction information with state, local, and tribal consumers of intelligence.




U.S. National Security and Foreign Policymaking After 9/11


Book Description

Examines the external, societal, and governmental sources of change to US national-security policymaking that were begun by 9/11, memorialized by the Intelligence Reform and Terrorism Prevention Act (2004). This book chronicles the manifold changes and what caused them.




9/11 Commission Recommendations


Book Description

This title presents the 9/11 Commission's recommendations and the status of their implementation.




FBI Intelligence Reform


Book Description

In the aftermath of September 11 2001, the Federal Bureau of Investigation (FBI) embarked on a program to reform its intelligence and national security programs. Many experts agree the FBI has made progress in some areas (dissemination of raw intelligence), but some believe that the FBI has shown little progress in other areas (establishing an integrated and proactive intelligence program) while the FBI's budget increased by 68 per cent from 2001-2005. The Weapons of Mass Destruction Commission has recommended, and the White House has approved, the establishment of a National Security Service within the FBI. This Service would integrate the FBI's Counterterrorism and Counterintelligence Division with the FBI's Directorate of Intelligence (DI). Whether this organisational change will yield substantive results is an open question. This book analyses the FBI's overall intelligence reform effort, focusing on the implementation of intelligence reform initiatives in the field.




Fixing the Facts


Book Description

What is the role of intelligence agencies in strategy and policy? How do policymakers use (or misuse) intelligence estimates? When do intelligence-policy relations work best? How do intelligence-policy failures influence threat assessment, military strategy, and foreign policy? These questions are at the heart of recent national security controversies, including the 9/11 attacks and the war in Iraq. In both cases the relationship between intelligence and policy broke down—with disastrous consequences. In Fixing the Facts, Joshua Rovner explores the complex interaction between intelligence and policy and shines a spotlight on the problem of politicization. Major episodes in the history of American foreign policy have been closely tied to the manipulation of intelligence estimates. Rovner describes how the Johnson administration dealt with the intelligence community during the Vietnam War; how President Nixon and President Ford politicized estimates on the Soviet Union; and how pressure from the George W. Bush administration contributed to flawed intelligence on Iraq. He also compares the U.S. case with the British experience between 1998 and 2003, and demonstrates that high-profile government inquiries in both countries were fundamentally wrong about what happened before the war.




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.