Reasons for Why the IC Has Consistently Been Able to Prevent the Gap Exposing the U.S. to Terrorist Threats
Reorganization and reform raise other questions – particularly concerning domestic intelligence. First, are these changes improving security? Major changes lead to implementation challenges. Second, has information sharing improved? Information sharing carries multiple meanings, which lead to differences in expectations. Lastly, has intelligence oversight improved?
They work on different kinds of problems for diverse sets of institutional and individual customers. The diversity of missions and masters has resulted in a pluralistic structure with sensible—if not always optimal—divisions of labor and professional specialization.The mission of intelligence analysis is to evaluate, integrate, and interpret information in order to provide warning, reduce uncertainty, and identify opportunities. Providing insight on trends, the political calculus of particular foreign leaders, or the way problems are perceived by people outside the United States is often more helpful to decision makers than is the presentation of additional “facts” or speculation about “worst case” possibilities. Discovering that a country is cheating on a treaty commitment may be less important than providing insight into why it is doing so.
Has the CIA failed to counter-terrorism and lagged in the use of technology to fight terrorism? Is the NSA technologically equipped to use technology in the war on terrorism? Which of the two organizations has had more success in the utilization of technology in the war on terrorism? These comprise the questions that this paper will answer.
The source and nature of the terrorist threat may have expanded, but we will continue to fight to ensure that all Americans are able to live free from the fear of violence, no matter the ideology behind it.
Best, R. (2001). The National Security Agency: Issues for Congress, Congressional Research Service Report for congress. London: The Library of Congress.
Duckworth, A. (1997). The Defense HUMINT Service: Preparing for the 21st Century. Defense Intelligence Journal, 6(1), 1-5.
Kramer, D. (2009). Cyber power and national security. Washington, D C: Center for Technology and National Security Policy.
Latham, R. (2003). Bombs & Bandwidth: The Emerging Relationship Between Information Technology and Security. New York: New Press.