Why the FBI Can't Build a Case Management System

Total Page:16

File Type:pdf, Size:1020Kb

Why the FBI Can't Build a Case Management System PERSPECTIVES Why the FBI Can’t Build a Case Management System Jerome W. Israel A review of the problems that haunted the FBI’s Virtual Case File and Sentinel case management programs and an examination of the techni- cal reasons for these failures provide the basis for recommendations to help avoid their repetition. pic software engineering failures are nothing new busy tending to cost and schedule that we failed to reckon in the federal government, but for the FBI, they’re with these issues. In addition, the project was simply too particularly bitter. large, too complex, and too unruly for an organization with E From about 2001 to 2004, the bureau spent $171 minimal engineering expertise. million on the failed Virtual Case File, and it has struggled Unfortunately, the FBI isn’t alone. Many federal agen- for nearly eight years after VCF to deliver Sentinel, a $451 cies undertake large IT projects and frequently end up in million program for which the chances for success and trouble. This cannot continue. In an era of soaring budget fulfilling the original requirements grow bleaker by the deficits, government must build IT differently. day. The plan was to automate the paper processes admin- istered by the FBI’s special agents. Instead, their hopes have EARLY WARNINGS been crushed twice, forcing them to continue managing In November 2004, just as we were driving the last nails cases and evidence in ways that haven’t improved dramati- into VCF’s coffin, FBI Director Robert Mueller invited Chief cally since the days of J. Edgar Hoover. Information Officer Zalmai (Zal) Azmi, Program Manage- How does something like this happen to the world’s ment Executive Dean Hall, and me to a meeting that also greatest law enforcement agency? What can possibly included Deputy Director John Pistole. The subject: a follow- be done? Much of what went wrong isn’t new, the usual on to VCF. My heart beat in my throat throughout most of fare that Frederick Brooks documented decades ago in the meeting because of fresh memories from my experi- The Mythical Man-Month: Essays on Software Engineering ence at the National Security Agency, where we worked (Addison-Wesley, 1995). But apart from that, the FBI en- doggedly on programs designed to convert a technology countered complex technical issues on Sentinel, several base focused on the Soviet Union into capabilities that of which had remained unresolved after VCF. We were so could manage the massive volumes and variety of commu- 0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society JUNE 2012 73 PERSPECTIVES nications emanating from the Internet. These were NSA’s flag then. Both proposals were generic and lacked creativ- proud turn-of-the-century transformation programs, but ity; they definitely weren’t equal to the effort the FBI had they all failed, including our flagship program Trailblazer, put into the RFP. With numerous public lessons learned on which cost more than $1 billion.1 VCF, we were surprised that neither proposal contained a Based on that dismal experience, it was no stretch to coherent plan that addressed the FBI’s most challenging conclude the following: technical problems. The FBI’s evaluators were split on whether to move for- t because of their enormous complexity, large IT pro- ward with a contract award. We were disappointed that grams rarely succeed; so few companies had bid on Sentinel and guessed that t large government contractors, “IT cartels” as former many were concerned about getting bogged down on the Obama administration CIO Vivek Kundra called them,2 project and then landing on the front pages of The Wash- are usually only out for money; and, ington Post. In the end, we moved forward and selected t program managers have a tendency to put a rosy spin Lockheed Martin. on projects even when they’re clearly in trouble. THREE WICKED PROBLEMS Moreover, the FBI’s engineering strength was weak—we Several wicked problems haunted us during Sentinel, didn’t have the engineering talent to pull off a major project and they will continue to haunt any case management like Sentinel. system development until they’re finally dealt with. Ocean and islands Mitigating our risk by demonstrating The “ocean-and-islands” problem was undoubt- some of the key technologies first edly the worst. The FBI operates in a vast ocean of data, would have given us confidence as we which agents can freely access in the legacy mainframe tackled building production versions Automated Case Support (ACS) system to advance their of these new capabilities. investigations. But in this data ocean are islands, which are restricted to only a few. For example, a counterterrorism case might contain data that agents can freely access and But the FBI wouldn’t be denied. We moved forward ag- view. But if the case agent were to upload newly acquired gressively early in 2005 to deliver a request for proposal healthcare information on a US citizen involved in the case, (RFP) by the end of the summer. But before the contract access to the case would suddenly be severely limited be- was even signed, harbingers of doom should have deterred cause the Health Insurance Portability and Accountability us. What Alan Wade, the CIA’s CIO, said when he addressed Act (HIPAA) contains strong provisions protecting the se- senior- and midlevel FBI IT managers in April 2005 was curity and privacy of healthcare records. Hospitals and stunning in light of the path we were on. The CIA was doctors must protect the privacy of these records, and the through with large IT programs, he told us. They just didn’t FBI must do so as well. The counterterrorism case now work. The agency had experienced countless setbacks on becomes an island. massive IT projects. The CIA’s new approach, he said, was There are vast numbers of islands in FBI case manage- to break them into smaller pieces, build momentum, and ment, hundreds of archipelagos. The FBI is required to achieve incremental success. In hindsight, we should have restrict access to grand jury proceedings and individual paid closer attention. IRS tax records. Also, if an agent were to upload a tran- We also should have built prototypes. We faced many script, or any other student records, the case would become mind-bending business and technical problems—“wicked” an island because the information is protected under the problems as technology executives described them in regu- Family Educational Rights and Privacy Act. lar meetings with the director. It seemed prudent to mitigate Nobody knew how many islands there were. Every time our risk by demonstrating some of the key technologies first. a new access control was needed, the Natural programmers This would have given us confidence as we tackled building wrote one in ACS. Some in the mainframe unit claimed production versions of these new capabilities. there were more than 20,000 such controls. This became a In November 2005, the CIO’s external board of advisors huge technology issue because we planned to use commer- strongly recommended that we build prototypes for Sen- cial software in Sentinel, but in 2005, we weren’t aware of a tinel. But under pressure to move forward, we didn’t take commercial solution that offered such fine-grained access the time or allocate the money to engage in this important control. At one point, we consulted NSA’s database research early step. experts about Oracle Label Security, a database security When the FBI sent the RFP to industry in August, we program that could protect records at the row and column received only two proposals. We should have seen a red level. We were hopeful about OLS, but the research experts 74 COMPUTER believed that it wasn’t “expressive” enough to handle the problems such as names, addresses, and phone numbers ocean-and-islands problem. not matching the format specified in Sentinel’s database. The access control issue was also a business problem. Migration promised to be very costly and time-consuming. If we were going to succeed, the operations organizations When the CIO executives discussed the problem in (the divisions specializing in counterterrorism, counter- August 2008, we debated one proposition—not to migrate intelligence, crime, and so on) had to reduce the number the data at all. This would require agents to work in two of access controls. This was difficult for the FBI because databases—ACS and Sentinel—but in five years, so the in 2001, Robert Hanssen, a career FBI employee who had argument went, the number of agents using ACS would access to some of the bureau’s most sensitive secrets, was be minimal. Besides, we had already determined that we arrested after 22 years of spying for the Soviets. This rocked couldn’t shut ACS down completely because a large amount the bureau and was a factor in VCF’s failure. of personnel and case information was stored on tape. If In February 2005, in a statement to the US Senate Ap- a Freedom of Information Act request came in, and the propriations Subcommittee on Commerce, Justice, State, requested data was on tape, we would have to use the ap- and the Judiciary, Department of Justice (DoJ) Inspector plications on the mainframe to retrieve the data. General Glenn Fine noted that in the Trilogy project, the At the end of our discussions, however, we decided third phase of which was VCF, there “… was a lack of firm that we couldn’t expect agents to work with two different understanding of the design requirements both by the FBI systems. So we continued down the data migration path, and the contractors.
Recommended publications
  • Waterfall Vs Agile Projects
    PROJECT COST MANAGEMENT A study of Waterfall Model vs Agile Model In submission for CI6204 SOFTWARE PROJECT MANAGEMENT AY 17/18 Sem 1 Submitted by: CHENG Shuyun (G1701268F) NAH Zheng Xiang, Philson (G1701513D) XUE Fei (G1701182G) Abstract In today’s competitive business environment, organizations require IT systems that constantly evolve to meet their ever-changing requirements. This has led many organizations to favor Agile Models over traditional Waterfall Models for software development. However, there appears to be a lack of understanding of how conventional PMBOK processes apply to these Agile Models. In this paper, we have analyzed the differences in Project Cost Management processes between Waterfall and Agile models, and found them to have fundamentally different priorities. The Waterfall Model aims to complete all the specified functionalities, while the Agile Model works on a ROI maximization approach. We then used the FBI Sentinel case study to examine the practical implications of the different approaches. In practice, the Waterfall Model’s sequential approach to development lead to greater project rigidity and inflexible timelines, while the Agile Model allowed for re-prioritization of requirements to deliver the features that matter most to users. Further analysis of the case study allowed us to tease out 3 major benefits of the Agile Model for Project Cost Management, namely – allowance for change, focus on business value, and predictable costs. 1. Introduction Software development methodologies are constantly evolving due to changing technologies and new demands from users. Today’s dynamic business environment has given rise to emergent organizations that continuously adapt their structures, strategies, and policies to suit new environments (Truex, Baskerville, & Klein, 1999).
    [Show full text]
  • The FBI's Counterterrorism Program
    U.S. Department of Justice Federal Bureau of Investigation Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001 April 14, 2004 Report to The National Commission on Terrorist Attacks upon the United States The FBI’s Counterterrorism Program Since September 2001 TABLETABLE OF OFCONTENTS CONTENTS I EXECUTIVE SUMMARY....................................................................11 II FBI ORGANIZATIONAL CHART................................................. 3 III TIMELINE OF SIGNIFICANT REFORMS AND INITIATIVES SINCE 9/11/01.......................................................... 4 IV INTRODUCTION......................................................................................66 V PRIORITIZATION....................................................................................77 The New Priorities.........................................................................................77 1 Protect the United States from Terrorist Attack..........................................77 2 Protect the United States Against Foreign Intelligence Operations and Espionage........................................................................................77 3 Protect the United States Against Cyber-based Attacks and High-Technology Crimes..................................................................88 4 Combat Public Corruption at all Levels.......................................................88 5 Protect Civil Rights......................................................................................88
    [Show full text]
  • Download FINAL 9-11 Review Commission Report
    UNCLASSIFIED (U) The FBI: Protecting the Homeland in the 21st Century (U) Report of the Congressionally-directed (U) 9/11 Review Commission To (U) The Director of the Federal Bureau of Investigation By (U) Commissioners Bruce Hoffman Edwin Meese III Timothy J. Roemer (U) March 2015 UNCLASSIFIED UNCLASSIFIED 1 UNCLASSIFIED UNCLASSIFIED (U) TABLE OF CONTENTS (U) Introduction: The 9/11 Review Commission…..……….………........ p. 3 (U) Chapter I: Baseline: The FBI Today…………………………….. p. 15 (U) Chapter II: The Sum of Five Cases………………….……………. p. 38 (U) Chapter III: Anticipating New Threats and Missions…………....... p. 53 (U) Chapter IV: Collaboration and Information Sharing………………. p. 73 (U) Chapter V: New Information Related to the 9/11 Attacks………… p. 100 (U) Key Findings and Recommendations…………………………………. p. 108 (U) Conclusion: ………………………………………………………… p. 118 (U) Appendix A: Briefs Provided by FBI Headquarters’ Divisions.…..… p. 119 (U) Appendix B: Interviews Conducted…………………………………. p. 121 (U) Appendix C: Select FBI Intelligence Program Developments…….… p. 122 (U) Appendix D: Acronyms……………………………………………… p. 124 2 UNCLASSIFIED UNCLASSIFIED (U) INTRODUCTION THE FBI 9/11 REVIEW COMMISSION (U) The FBI 9/11 Review Commission was established in January 2014 pursuant to a congressional mandate.1 The United States Congress directed the Federal Bureau of Investigation (FBI, or the “Bureau”) to create a commission with the expertise and scope to conduct a “comprehensive external review of the implementation of the recommendations related to the FBI that were proposed by the National Commission on Terrorist Attacks Upon the United States (commonly known as the 9/11 Commission).”2 The Review Commission was tasked specifically to report on: 1.
    [Show full text]
  • Why Software Fails By: Robert N
    Sponsored By Why Software Fails By: Robert N. Charette Have you heard the one about the disappearing warehouse? One day, it vanished—not from physical view, but from the watchful eyes of a well-known retailer's automated distribution system. A software glitch had somehow erased the warehouse's existence, so that goods destined for the warehouse were rerouted elsewhere, while goods at the warehouse languished. Because the company was in financial trouble and had been shuttering other warehouses to save money, the employees at the "missing" warehouse kept quiet. For three years, nothing arrived or left. Employees were still getting their paychecks, however, because a different computer system handled the payroll. When the software glitch finally came to light, the merchandise in the warehouse was sold off, and upper management told employees to say nothing about the episode. This story has been floating around the information technology industry for 20-some years. It's probably apocryphal, but for those of us in the business, it's entirely plausible. Why? Because episodes like this happen all the time. Last October, for instance, the giant British food retailer J Sainsbury PLC had to write off its US $526 million investment in an automated supply-chain management system. It seems that merchandise was stuck in the company's depots and warehouses and was not getting through to many of its stores. Sainsbury was forced to hire about 3000 additional clerks to stock its shelves manually [see photo, "Market Crash"] This is only one of the latest in a long, dismal history of IT projects gone awry [see table, "Software Hall of Shame" for other notable fiascoes].
    [Show full text]
  • Denver International Airport
    F AILURE AT THE S PEED OF L IGHT PROJECT ESCALATION AND DE-ESCALATION IN THE SOFTWARE INDUSTRY Master of Arts in Law and Diplomacy Thesis Submitted by Thomas B. Hickerson Spring 2006 © 2006 Thomas B. Hickerson http://fletcher.tufts.edu Thomas B. HICKERSON / Failure at the Speed of Light Acknowledgement This thesis would not have been possible to write without a number of kind, generous and loving people that helped me on my way here at the Fletcher School. First and foremost, I want to thank my wife and my parents for all their love and support during my time at the Fletcher School. My wife Svitlana has and will always be my support, my love, and inspired me to seek a better life for the both of us. My parents always provided us with a loving home to come back to, even when we were many hours—and time zones—away. I also want to take a moment to thank my MALD thesis advisor, Professor Bernard Simonin, for all his guidance, advice and support over the past year. Working with him on the thesis and in the classroom has been invaluable and inspiring. Together with Professor Simonin I would like to thank my academic advisor, Professor Paul Vaaler, and the Fletcher faculty as a whole, including Professor Carolyn Gideon, Professor Laurent Jacque, Professor Lisa Lynch and Professor Alan Henrikson. 2 Thomas B. HICKERSON / Failure at the Speed of Light Table of Contents Table of Contents ............................................................................................................1 1. Abstract...................................................................................................................4 2. Introduction and Problem Definition........................................................................5 2.1. Methods...........................................................................................................8 2.1.1.
    [Show full text]
  • 2006, CMP Technology. Important Note: This PDF Is Provided Solely As a Reader Service
    Copyright (c) 2006, CMP Technology. Important note: This PDF is provided solely as a reader service. It is not intended for reproduction or public distribu- tion. For more information on obtaining a Reprint, please contact a Reprint Services Rep at 951.698.1780 or visit www.cmpreprints.com/faxback.jhtml. Copyright (c) 2006, CMP Technology. Important note: This PDF is provided solely as a reader service. It is not intended for reproduction or public distribu- tion. For more information on obtaining a Reprint, please contact a Reprint Services Rep at 951.698.1780 or visit www.cmpreprints.com/faxback.jhtml. IT is complex, famously and infamous- ly so. Thousands of variables factor into the success or failure of a high-profile project. Will your career be defined by the data ware- house, delivered on time and under budget, that uncovered a thousand business opportun- ities? Or the ERP fiasco that forced the CFO to put one of those ugly footnotes about an unanticipated supply chain shortfall into the quarterly SEC filing? Here we recount eight tech blunders—costly mistakes for the people involved and lessons for the rest of us. They range from application upgrades gone awry to wholesale strategy shifts that landed in the muck. There’s the publicly traded company that prematurely un- plugged its accounting system, the federal agency whose failed upgrade opened the door to fraudsters, the utility company that plunged much of North America into darkness because of a failed server reboot, and more. What follows are business technology fias- y t 8 BLUNDERS t e G / n e h You Should Never Make c t i K s i n n e D By Paul McDougall informationweek.com Oct.
    [Show full text]
  • IEEE Spectrum Who Killed the Virtual Case File?
    IEEE Spectrum: Who Killed the Virtual Case File? http://spectrum.ieee.org/computing/software/who-killed-the-virt... COMPUTING // SOFTWARE FEATURE Who Killed the Virtual Case File? How the FBI blew more than $100 million on case-management software it will never use BY HARRY GOLDSTEIN // SEPTEMBER 2005 In the early 1990s, Russian mobsters partnered with Italian Mafia families in Newark, N.J., to skim millions of dollars in federal and New Jersey state gasoline and diesel taxes. Special Agent Larry Depew set up an undercover sting operation under the direction of Robert J. Chiaradio, a supervisor at the Federal Bureau of Investigation's Washington, D.C., headquarters. Depew collected reams of evidence from wiretaps, interviews, and financial transactions over the course of two and a half years. Unfortunately, the FBI couldn't provide him with a database program that would help organize the information, so Depew wrote one himself. He used it to trace relationships between telephone calls, meetings, surveillance, and interviews, but he could not import information from other investigations that might shed light on his own. So it wasn't until Depew mentioned the name of a suspect to a colleague that he obtained a briefcase that his friend had been holding since 1989. "When I opened it up, it was a treasure trove of information about who's involved in the conspiracy, including the Gambino family, the Genovese family, and the Russian components. It listed percentages of who got what, when people were supposed to pay, the number of gallons. It became a central piece of evidence," Depew recalled during an interview at the FBI's New Jersey Regional Computer Forensic Laboratory, in Hamilton, where he is the director.
    [Show full text]
  • Federal Bureau of Investigation's Management of the Trilogy
    THE FEDERAL BUREAU OF INVESTIGATION’S MANAGEMENT OF THE TRILOGY INFORMATION TECHNOLOGY MODERNIZATION PROJECT U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-07 February 2005 THE FEDERAL BUREAU OF INVESTIGATION’S MANAGEMENT OF THE TRILOGY INFORMATION TECHNOLOGY MODERNIZATION PROJECT EXECUTIVE SUMMARY This audit assesses the progress of the Federal Bureau of Investigation’s (FBI) Trilogy project. Initiated in mid-2001, the objective of Trilogy is to modernize the FBI’s information technology (IT) infrastructure; provide needed IT applications for FBI agents, analysts, and others to efficiently and effectively do their jobs; and lay the foundation for future IT improvements in the FBI. Trilogy consists of three parts: 1) upgrading the FBI’s hardware and software, 2) upgrading of the FBI’s communications network, and 3) upgrading the FBI’s five most important investigative applications, including its antiquated case management system. Because of the FBI’s immediate and critical need for modern IT systems and the past problems in the Trilogy project, we conducted this audit to assess the FBI’s progress in meeting cost, schedule, technical, and performance targets for the three components of Trilogy. We also examined the extent to which Trilogy will meet the FBI’s current and longer-term IT needs. In April 2004, the FBI completed the first two components of Trilogy. Among other improvements, the FBI has improved its IT infrastructure with new desktop computers for its employees and has deployed a Wide Area Network to enhance electronic communication among FBI offices and with other law enforcement organizations.
    [Show full text]
  • Guide to the Systems Engineering Body of Knowledge (Sebok), Version 2.4
    Guide to the Systems Engineering Body of Knowledge (SEBoK), version 2.4 Part 7 Released 19 May 2021 Please note that this is a PDF extraction of the content from www.sebokwiki.org Guide to the Systems Engineering Body of Knowledge, Part 7 version 2.4 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Wed, 19 May 2021 18:22:38 EDT Contents Articles Front Matter 1 Letter from the Editor 1 BKCASE Governance and Editorial Board 2 Acknowledgements and Release History 7 Cite the SEBoK 10 Bkcase Wiki:Copyright 11 Part 7: Systems Engineering Implementation Examples 12 Systems Engineering Implementation Examples 12 Matrix of Implementation Examples 15 Matrix of Implementation Examples 15 Implementation Examples 19 Implementation Examples 19 Defense System Examples 22 Submarine Warfare Federated Tactical Systems 22 Virginia Class Submarine 28 Information System Examples 32 Complex Adaptive Taxi Service Scheduler 32 Successful Business Transformation within a Russian Information Technology Company 38 FBI Virtual Case File System 45 Management System Examples 49 Project Management for a Complex Adaptive Operating System 49 Medical System Examples 54 Next Generation Medical Infusion Pump 54 Medical Radiation 59 Design for Maintainability 62 Space System Examples 65 Global Positioning System Case Study 65 Global Positioning System Case Study II 69 Russian Space Agency Project Management Systems 76 How Lack of Information Sharing Jeopardized the NASA/ESA Cassini/Huygens Mission
    [Show full text]
  • Information Systems for Business Managers
    INFORMATION TECHNOLOGY FOR MANAGERS This page intentionally left blank INFORMATION TECHNOLOGY FOR MANAGERS George W. Reynolds University of Cincinnati Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Information Technology for Managers © 2010 Course Technology, Cengage Learning George W. Reynolds ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced, transmitted, stored, or used in any form or by VP/Editorial Director: Jack Calhoun any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, Senior Acquisitions Editor: Charles information networks, or information storage and retrieval systems, except McCormick, Jr. as permitted under Section 107 or 108 of the 1976 United States Copyright Product Manager: Kate Hennessy Mason Act, without the prior written permission of the publisher. Development Editor: Dan Seiter, Mary Pat For product information and technology assistance, contact us at Shaffer Cengage Learning Academic Resource Center, 1-800-354-9706 Editorial Assistant: Bryn Lathrop For permission to use material from this text or product, Marketing Manager: Bryant Chrzan submit all requests online at www.cengage.com/permissions Further permission questions can be emailed to Marketing Coordinator: Suellen Ruttkay [email protected] Content Product Manager: Heather Furrow ISBN-13: 978-1-4239-0169-3 Senior Art Director: Stacy Jenkins Shirley ISBN-10: 1-4239-0169-X Cover Designer: Lou Ann Thesing Course Technology 20 Channel Center Street Cover Image: ©Getty Images/Photodisc Boston, MA 02210 Technology Project Manager: Chris Valentine USA Manufacturing Coordinator: Julio Esperas Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Composition: GEX Publishing Services Kingdom, Australia, Mexico, Brazil, and Japan.
    [Show full text]
  • Federal Bureau of Investigation's Informa- Tion Technology Modernization Pro- Gram, Trilogy Hearing Committee on Appropriation
    S. HRG. 109–76 FEDERAL BUREAU OF INVESTIGATION’S INFORMA- TION TECHNOLOGY MODERNIZATION PRO- GRAM, TRILOGY HEARING BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED NINTH CONGRESS FIRST SESSION SPECIAL HEARING FEBRUARY 3, 2005—WASHINGTON, DC Printed for the use of the Committee on Appropriations ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 20–668 PDF WASHINGTON : 2005 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON APPROPRIATIONS THAD COCHRAN, Mississippi, Chairman TED STEVENS, Alaska ROBERT C. BYRD, West Virginia ARLEN SPECTER, Pennsylvania DANIEL K. INOUYE, Hawaii PETE V. DOMENICI, New Mexico PATRICK J. LEAHY, Vermont CHRISTOPHER S. BOND, Missouri TOM HARKIN, Iowa MITCH MCCONNELL, Kentucky BARBARA A. MIKULSKI, Maryland CONRAD BURNS, Montana HARRY REID, Nevada RICHARD C. SHELBY, Alabama HERB KOHL, Wisconsin JUDD GREGG, New Hampshire PATTY MURRAY, Washington ROBERT F. BENNETT, Utah BYRON L. DORGAN, North Dakota LARRY CRAIG, Idaho DIANNE FEINSTEIN, California KAY BAILEY HUTCHISON, Texas RICHARD J. DURBIN, Illinois MIKE DEWINE, Ohio TIM JOHNSON, South Dakota SAM BROWNBACK, Kansas MARY L. LANDRIEU, Louisiana WAYNE ALLARD, Colorado J. KEITH KENNEDY, Staff Director TERRENCE E. SAUVAIN, Minority Staff Director SUBCOMMITTEE ON COMMERCE, JUSTICE, AND STATE, THE JUDICIARY, AND RELATED AGENCIES JUDD GREGG, New Hampshire, Chairman TED STEVENS, Alaska ————— PETE V. DOMENICI, New Mexico DANIEL K. INOUYE, Hawaii MITCH MCCONNELL, Kentucky BARBARA A.
    [Show full text]
  • FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress
    Order Code RL32336 CRS Report for Congress Received through the CRS Web FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress Updated August 4, 2004 Alfred Cumming Specialist in Intelligence and National Security Foreign Affairs, Defense and Trade Division Todd Masse Specialist in Domestic Intelligence and Counterterrorism Domestic Social Policy Division Congressional Research Service ˜ The Library of Congress FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress Summary The Intelligence Community, including the Federal Bureau of Investigation (FBI), has been criticized for failing to warn of the attacks of September 11, 2001. In a sweeping indictment of the FBI’s intelligence activities relating to counterterrorism and September 11, the Congressional Joint Inquiry Into the Terrorist Attacks of September 11, 2001, singled out the FBI in a significant manner for failing to focus on the domestic terrorist threat; collect useful intelligence; analyze strategic intelligence; and to share intelligence internally and with other members of the Intelligence Community. The Joint Inquiry concluded that the FBI was seriously deficient in identifying, reporting on, and defending against the foreign terrorist threat to the United States. The FBI is responding by attempting to transform itself into an agency that can prevent terrorist acts, rather than react to them as crimes. The major component of this effort is restructuring and upgrading of its various intelligence support units into a formal and integrated intelligence program, which includes the adoption of new operational practices, and the improvement of its information technology. FBI Director Robert S. Mueller, III, has introduced reforms to curb the autonomy of the organization’s 56 field offices by consolidating and centralizing FBI Headquarters control over all counterterrorism and counterintelligence cases.
    [Show full text]