2006, CMP Technology. Important Note: This PDF Is Provided Solely As a Reader Service

Total Page:16

File Type:pdf, Size:1020Kb

2006, CMP Technology. Important Note: This PDF Is Provided Solely As a Reader Service Copyright (c) 2006, CMP Technology. Important note: This PDF is provided solely as a reader service. It is not intended for reproduction or public distribu- tion. For more information on obtaining a Reprint, please contact a Reprint Services Rep at 951.698.1780 or visit www.cmpreprints.com/faxback.jhtml. Copyright (c) 2006, CMP Technology. Important note: This PDF is provided solely as a reader service. It is not intended for reproduction or public distribu- tion. For more information on obtaining a Reprint, please contact a Reprint Services Rep at 951.698.1780 or visit www.cmpreprints.com/faxback.jhtml. IT is complex, famously and infamous- ly so. Thousands of variables factor into the success or failure of a high-profile project. Will your career be defined by the data ware- house, delivered on time and under budget, that uncovered a thousand business opportun- ities? Or the ERP fiasco that forced the CFO to put one of those ugly footnotes about an unanticipated supply chain shortfall into the quarterly SEC filing? Here we recount eight tech blunders—costly mistakes for the people involved and lessons for the rest of us. They range from application upgrades gone awry to wholesale strategy shifts that landed in the muck. There’s the publicly traded company that prematurely un- plugged its accounting system, the federal agency whose failed upgrade opened the door to fraudsters, the utility company that plunged much of North America into darkness because of a failed server reboot, and more. What follows are business technology fias- y t 8 BLUNDERS t e G / n e h You Should Never Make c t i K s i n n e D By Paul McDougall informationweek.com Oct. 16, 2006 39 Copyright (c) 2006, CMP Technology. Important note: This PDF is provided solely as a reader service. It is not intended for reproduction or public distribu- tion. For more information on obtaining a Reprint, please contact a Reprint Services Rep at 951.698.1780 or visit www.cmpreprints.com/faxback.jhtml. IN DEPTH / IT FIASCOES coes, some lesser-known, that continue to serve as pated systemwide cost over several years was ex- shining examples of what not to do. pected to be in excess of $1 billion,” the filing says. Among all companies, the billion-dollar IT extrava- ganza has gone the way of the McDLT sandwich: It’s Rule DON’T BITE OFF TOO MUCH more than anyone wants to bite off. #1 cDonald’s Restaurants undertook a proj- Rule ect so grand in scale and scope that, well, #2 TROUBLESHOOT WITH CARE M it couldn’t be done. In 2001, the fast-food chain conceived a project to create an intranet con- ech disasters sometimes ripple far beyond the necting headquarters with far-flung restaurants that company that messed up. At First Energy, an would provide operational information in real time. T Ohio utility that distributes electricity to 4.5 mil- Under the plan, dubbed Innovate, a manager in the lion customers, a software bug contributed to a power company’s Oak Brook, Ill., headquarters would know failure that wiped out service for much of the northeast- instantly if sales were slowing at a franchise in Or- ern United States and parts of Canada three years ago. lando, Fla., or if the grill temperature at a London The blackout was blamed on cascading failures that restaurant wasn’t hot enough. McDonald’s always has occurred when falling trees in Ohio took out power been tight lipped about Innovate—the company didn’t lines and upset the balance of electrical inflows and return calls seeking comment for this story—but outflows in the Northeast grid. But the real failure oc- there’s no doubt about its far-reaching scope. Accord- curred in First Energy’s computer department, where ing to a white paper by Mpower, managers appear to have forgot- the consulting firm McDonald’s ten a fundamental rule of opera- hired for early planning and Nothing tions: Adhere to basic IT man- funny technology procurement, the about a agement protocols, such as those idea was to create “a global ERP $170 specified by the Information application that will eventually million Technology Infrastructure Li- write-off touch every one of McDonald’s brary, regardless of how much stores.” In other words, about tech automation is in place or 30,000 restaurants in more how experienced your staff is. than 120 countries. Piece of Mc- What’s not widely known is Cake, right? that the blackout could have According to Securities and been limited to a local problem if Exchange Commission docu- a software alarm system at First ments filed by McDonald’s, the Energy, designed to warn engi- company realized the project neers about unstable conditions, was over the top only after it hadn’t failed. That’s the thing spent $170 million on consult- about alarms: By the time you ants and initial implementation find out they’re not working, it’s planning. McDonald’s ultimately too late. “It didn’t cause the signaled Innovate’s demise in a power to go off, but it was a big paragraph buried within a 2003 contributor to the lack of re- SEC filing, which noted the write-off and “manage- sponse by First Energy,” says Stan Johnson, manager ment’s decision to terminate a long-term technology of infrastructure security at the North American Elec- project.” tric Reliability Council. The filing revealed what most experienced IT proj- At about 2 p.m. on Aug. 13, 2003, IT staff at the utility ect managers could have told McDonald’s from the discovered that the servers hosting its General Elec- start: An attempt to create a worldwide network deliv- tric XA/21 energy management system’s alarm mod- ering real-time information to thousands of stores, ule had crashed.The staff rebooted them in an effort to some in countries that lacked network infrastructure, fix the problem, but when the servers revived, the was destined to fail. “Although the terminated tech- alarm remained off-line. GE later said in a statement nology project was projected to deliver long-term that a software coding error caused the alarm applica- benefits, it was no longer viewed as the best use tion to go into an infinite loop rather than come back of capital in the current environment, as the antici- online. Control room operators at First Energy facili- 40 Oct. 16, 2006 informationweek.com Copyright (c) 2006, CMP Technology. Important note: This PDF is provided solely as a reader service. It is not intended for reproduction or public distribu- tion. For more information on obtaining a Reprint, please contact a Reprint Services Rep at 951.698.1780 or visit www.cmpreprints.com/faxback.jhtml. IN DEPTH / IT FIASCOES ties in Ohio were unaware that this line of defense was 2002 Earthcare filed kaput, because IT didn’t verify that all systems were for bankruptcy. Shin- back online after the reboot. Meanwhile, unstable skey left the com- power conditions were mounting rapidly. pany that June when Ignoring IT management best practices, staff didn’t Earthcare sold Inter- bother to check with end users to ensure that they had national Petroleum to regained full use of the critical system. Among other U.S. Filter Recovery things, ITIL recommends that IT departments create a Services. call list of affected users that administrators must con- That’s not the end tact following the reboot of a critical system. In its final of this story. After a report on the blackout, the North American Electric year at U.S. Filter, Shinskey: Reliability Council chastised First Energy’s IT depart- Shinskey and his ac- Accountant lost his ment for its lack of communications. counting team were accounting First Energy declined requests for an interview,but moved from Sage system Johnson says the company has complied with recom- Software’s MAS 200 mendations contained in the council’s final report on application to a system called Uptime from Uptime the blackout. Among other things, the council urged Software. “It was so bad we called it downtime,” Shin- First Energy to create precise, written protocols for skey says. The problem was that U.S. Filter was using managing the testing, deployment, and backup of key an outdated version of the software from the early hardware and software systems, including methods 1980s and didn’t want to spend money integrating for performing system upgrades, patch management, Shinskey’s unit into the company’s Oracle environ- rollbacks, and maintenance. It also said the company ment. “There were no drop-down menus, and if you needed to establish well-defined communications didn’t have a million cheat sheets tacked to your com- protocols in the event of a system failure. Sound ad- puter you couldn’t use it,” he says. It was so migraine- vice for all companies. inducing that accountants and bookkeepers left U.S. Filter “in droves” to escape it, Shinskey says. Repre- sentatives from U.S. Filter, now a unit of Siemens, didn’t Rule SWEAT THE DETAILS respond to our inquiries. #3 The lesson here, he says, is that companies must think magine working as an accountant in a company through all the operational implications when business with no accounting system.That’s what happened units are brought together in mergers. That includes I to Dale Shinskey, a finance professional who in having the right tools to support corporate governance. 2000 landed at oil recycling company Earthcare. The company had snapped up International Petroleum, Shinskey’s unit at his previous employer, World Fuel Rule DON’T MARRY FOR MONEY #4 Services, for $35 million.
Recommended publications
  • Waterfall Vs Agile Projects
    PROJECT COST MANAGEMENT A study of Waterfall Model vs Agile Model In submission for CI6204 SOFTWARE PROJECT MANAGEMENT AY 17/18 Sem 1 Submitted by: CHENG Shuyun (G1701268F) NAH Zheng Xiang, Philson (G1701513D) XUE Fei (G1701182G) Abstract In today’s competitive business environment, organizations require IT systems that constantly evolve to meet their ever-changing requirements. This has led many organizations to favor Agile Models over traditional Waterfall Models for software development. However, there appears to be a lack of understanding of how conventional PMBOK processes apply to these Agile Models. In this paper, we have analyzed the differences in Project Cost Management processes between Waterfall and Agile models, and found them to have fundamentally different priorities. The Waterfall Model aims to complete all the specified functionalities, while the Agile Model works on a ROI maximization approach. We then used the FBI Sentinel case study to examine the practical implications of the different approaches. In practice, the Waterfall Model’s sequential approach to development lead to greater project rigidity and inflexible timelines, while the Agile Model allowed for re-prioritization of requirements to deliver the features that matter most to users. Further analysis of the case study allowed us to tease out 3 major benefits of the Agile Model for Project Cost Management, namely – allowance for change, focus on business value, and predictable costs. 1. Introduction Software development methodologies are constantly evolving due to changing technologies and new demands from users. Today’s dynamic business environment has given rise to emergent organizations that continuously adapt their structures, strategies, and policies to suit new environments (Truex, Baskerville, & Klein, 1999).
    [Show full text]
  • The FBI's Counterterrorism Program
    U.S. Department of Justice Federal Bureau of Investigation Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001 April 14, 2004 Report to The National Commission on Terrorist Attacks upon the United States The FBI’s Counterterrorism Program Since September 2001 TABLETABLE OF OFCONTENTS CONTENTS I EXECUTIVE SUMMARY....................................................................11 II FBI ORGANIZATIONAL CHART................................................. 3 III TIMELINE OF SIGNIFICANT REFORMS AND INITIATIVES SINCE 9/11/01.......................................................... 4 IV INTRODUCTION......................................................................................66 V PRIORITIZATION....................................................................................77 The New Priorities.........................................................................................77 1 Protect the United States from Terrorist Attack..........................................77 2 Protect the United States Against Foreign Intelligence Operations and Espionage........................................................................................77 3 Protect the United States Against Cyber-based Attacks and High-Technology Crimes..................................................................88 4 Combat Public Corruption at all Levels.......................................................88 5 Protect Civil Rights......................................................................................88
    [Show full text]
  • Download FINAL 9-11 Review Commission Report
    UNCLASSIFIED (U) The FBI: Protecting the Homeland in the 21st Century (U) Report of the Congressionally-directed (U) 9/11 Review Commission To (U) The Director of the Federal Bureau of Investigation By (U) Commissioners Bruce Hoffman Edwin Meese III Timothy J. Roemer (U) March 2015 UNCLASSIFIED UNCLASSIFIED 1 UNCLASSIFIED UNCLASSIFIED (U) TABLE OF CONTENTS (U) Introduction: The 9/11 Review Commission…..……….………........ p. 3 (U) Chapter I: Baseline: The FBI Today…………………………….. p. 15 (U) Chapter II: The Sum of Five Cases………………….……………. p. 38 (U) Chapter III: Anticipating New Threats and Missions…………....... p. 53 (U) Chapter IV: Collaboration and Information Sharing………………. p. 73 (U) Chapter V: New Information Related to the 9/11 Attacks………… p. 100 (U) Key Findings and Recommendations…………………………………. p. 108 (U) Conclusion: ………………………………………………………… p. 118 (U) Appendix A: Briefs Provided by FBI Headquarters’ Divisions.…..… p. 119 (U) Appendix B: Interviews Conducted…………………………………. p. 121 (U) Appendix C: Select FBI Intelligence Program Developments…….… p. 122 (U) Appendix D: Acronyms……………………………………………… p. 124 2 UNCLASSIFIED UNCLASSIFIED (U) INTRODUCTION THE FBI 9/11 REVIEW COMMISSION (U) The FBI 9/11 Review Commission was established in January 2014 pursuant to a congressional mandate.1 The United States Congress directed the Federal Bureau of Investigation (FBI, or the “Bureau”) to create a commission with the expertise and scope to conduct a “comprehensive external review of the implementation of the recommendations related to the FBI that were proposed by the National Commission on Terrorist Attacks Upon the United States (commonly known as the 9/11 Commission).”2 The Review Commission was tasked specifically to report on: 1.
    [Show full text]
  • Why Software Fails By: Robert N
    Sponsored By Why Software Fails By: Robert N. Charette Have you heard the one about the disappearing warehouse? One day, it vanished—not from physical view, but from the watchful eyes of a well-known retailer's automated distribution system. A software glitch had somehow erased the warehouse's existence, so that goods destined for the warehouse were rerouted elsewhere, while goods at the warehouse languished. Because the company was in financial trouble and had been shuttering other warehouses to save money, the employees at the "missing" warehouse kept quiet. For three years, nothing arrived or left. Employees were still getting their paychecks, however, because a different computer system handled the payroll. When the software glitch finally came to light, the merchandise in the warehouse was sold off, and upper management told employees to say nothing about the episode. This story has been floating around the information technology industry for 20-some years. It's probably apocryphal, but for those of us in the business, it's entirely plausible. Why? Because episodes like this happen all the time. Last October, for instance, the giant British food retailer J Sainsbury PLC had to write off its US $526 million investment in an automated supply-chain management system. It seems that merchandise was stuck in the company's depots and warehouses and was not getting through to many of its stores. Sainsbury was forced to hire about 3000 additional clerks to stock its shelves manually [see photo, "Market Crash"] This is only one of the latest in a long, dismal history of IT projects gone awry [see table, "Software Hall of Shame" for other notable fiascoes].
    [Show full text]
  • Denver International Airport
    F AILURE AT THE S PEED OF L IGHT PROJECT ESCALATION AND DE-ESCALATION IN THE SOFTWARE INDUSTRY Master of Arts in Law and Diplomacy Thesis Submitted by Thomas B. Hickerson Spring 2006 © 2006 Thomas B. Hickerson http://fletcher.tufts.edu Thomas B. HICKERSON / Failure at the Speed of Light Acknowledgement This thesis would not have been possible to write without a number of kind, generous and loving people that helped me on my way here at the Fletcher School. First and foremost, I want to thank my wife and my parents for all their love and support during my time at the Fletcher School. My wife Svitlana has and will always be my support, my love, and inspired me to seek a better life for the both of us. My parents always provided us with a loving home to come back to, even when we were many hours—and time zones—away. I also want to take a moment to thank my MALD thesis advisor, Professor Bernard Simonin, for all his guidance, advice and support over the past year. Working with him on the thesis and in the classroom has been invaluable and inspiring. Together with Professor Simonin I would like to thank my academic advisor, Professor Paul Vaaler, and the Fletcher faculty as a whole, including Professor Carolyn Gideon, Professor Laurent Jacque, Professor Lisa Lynch and Professor Alan Henrikson. 2 Thomas B. HICKERSON / Failure at the Speed of Light Table of Contents Table of Contents ............................................................................................................1 1. Abstract...................................................................................................................4 2. Introduction and Problem Definition........................................................................5 2.1. Methods...........................................................................................................8 2.1.1.
    [Show full text]
  • IEEE Spectrum Who Killed the Virtual Case File?
    IEEE Spectrum: Who Killed the Virtual Case File? http://spectrum.ieee.org/computing/software/who-killed-the-virt... COMPUTING // SOFTWARE FEATURE Who Killed the Virtual Case File? How the FBI blew more than $100 million on case-management software it will never use BY HARRY GOLDSTEIN // SEPTEMBER 2005 In the early 1990s, Russian mobsters partnered with Italian Mafia families in Newark, N.J., to skim millions of dollars in federal and New Jersey state gasoline and diesel taxes. Special Agent Larry Depew set up an undercover sting operation under the direction of Robert J. Chiaradio, a supervisor at the Federal Bureau of Investigation's Washington, D.C., headquarters. Depew collected reams of evidence from wiretaps, interviews, and financial transactions over the course of two and a half years. Unfortunately, the FBI couldn't provide him with a database program that would help organize the information, so Depew wrote one himself. He used it to trace relationships between telephone calls, meetings, surveillance, and interviews, but he could not import information from other investigations that might shed light on his own. So it wasn't until Depew mentioned the name of a suspect to a colleague that he obtained a briefcase that his friend had been holding since 1989. "When I opened it up, it was a treasure trove of information about who's involved in the conspiracy, including the Gambino family, the Genovese family, and the Russian components. It listed percentages of who got what, when people were supposed to pay, the number of gallons. It became a central piece of evidence," Depew recalled during an interview at the FBI's New Jersey Regional Computer Forensic Laboratory, in Hamilton, where he is the director.
    [Show full text]
  • Federal Bureau of Investigation's Management of the Trilogy
    THE FEDERAL BUREAU OF INVESTIGATION’S MANAGEMENT OF THE TRILOGY INFORMATION TECHNOLOGY MODERNIZATION PROJECT U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-07 February 2005 THE FEDERAL BUREAU OF INVESTIGATION’S MANAGEMENT OF THE TRILOGY INFORMATION TECHNOLOGY MODERNIZATION PROJECT EXECUTIVE SUMMARY This audit assesses the progress of the Federal Bureau of Investigation’s (FBI) Trilogy project. Initiated in mid-2001, the objective of Trilogy is to modernize the FBI’s information technology (IT) infrastructure; provide needed IT applications for FBI agents, analysts, and others to efficiently and effectively do their jobs; and lay the foundation for future IT improvements in the FBI. Trilogy consists of three parts: 1) upgrading the FBI’s hardware and software, 2) upgrading of the FBI’s communications network, and 3) upgrading the FBI’s five most important investigative applications, including its antiquated case management system. Because of the FBI’s immediate and critical need for modern IT systems and the past problems in the Trilogy project, we conducted this audit to assess the FBI’s progress in meeting cost, schedule, technical, and performance targets for the three components of Trilogy. We also examined the extent to which Trilogy will meet the FBI’s current and longer-term IT needs. In April 2004, the FBI completed the first two components of Trilogy. Among other improvements, the FBI has improved its IT infrastructure with new desktop computers for its employees and has deployed a Wide Area Network to enhance electronic communication among FBI offices and with other law enforcement organizations.
    [Show full text]
  • Guide to the Systems Engineering Body of Knowledge (Sebok), Version 2.4
    Guide to the Systems Engineering Body of Knowledge (SEBoK), version 2.4 Part 7 Released 19 May 2021 Please note that this is a PDF extraction of the content from www.sebokwiki.org Guide to the Systems Engineering Body of Knowledge, Part 7 version 2.4 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Wed, 19 May 2021 18:22:38 EDT Contents Articles Front Matter 1 Letter from the Editor 1 BKCASE Governance and Editorial Board 2 Acknowledgements and Release History 7 Cite the SEBoK 10 Bkcase Wiki:Copyright 11 Part 7: Systems Engineering Implementation Examples 12 Systems Engineering Implementation Examples 12 Matrix of Implementation Examples 15 Matrix of Implementation Examples 15 Implementation Examples 19 Implementation Examples 19 Defense System Examples 22 Submarine Warfare Federated Tactical Systems 22 Virginia Class Submarine 28 Information System Examples 32 Complex Adaptive Taxi Service Scheduler 32 Successful Business Transformation within a Russian Information Technology Company 38 FBI Virtual Case File System 45 Management System Examples 49 Project Management for a Complex Adaptive Operating System 49 Medical System Examples 54 Next Generation Medical Infusion Pump 54 Medical Radiation 59 Design for Maintainability 62 Space System Examples 65 Global Positioning System Case Study 65 Global Positioning System Case Study II 69 Russian Space Agency Project Management Systems 76 How Lack of Information Sharing Jeopardized the NASA/ESA Cassini/Huygens Mission
    [Show full text]
  • Information Systems for Business Managers
    INFORMATION TECHNOLOGY FOR MANAGERS This page intentionally left blank INFORMATION TECHNOLOGY FOR MANAGERS George W. Reynolds University of Cincinnati Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Information Technology for Managers © 2010 Course Technology, Cengage Learning George W. Reynolds ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced, transmitted, stored, or used in any form or by VP/Editorial Director: Jack Calhoun any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, Senior Acquisitions Editor: Charles information networks, or information storage and retrieval systems, except McCormick, Jr. as permitted under Section 107 or 108 of the 1976 United States Copyright Product Manager: Kate Hennessy Mason Act, without the prior written permission of the publisher. Development Editor: Dan Seiter, Mary Pat For product information and technology assistance, contact us at Shaffer Cengage Learning Academic Resource Center, 1-800-354-9706 Editorial Assistant: Bryn Lathrop For permission to use material from this text or product, Marketing Manager: Bryant Chrzan submit all requests online at www.cengage.com/permissions Further permission questions can be emailed to Marketing Coordinator: Suellen Ruttkay [email protected] Content Product Manager: Heather Furrow ISBN-13: 978-1-4239-0169-3 Senior Art Director: Stacy Jenkins Shirley ISBN-10: 1-4239-0169-X Cover Designer: Lou Ann Thesing Course Technology 20 Channel Center Street Cover Image: ©Getty Images/Photodisc Boston, MA 02210 Technology Project Manager: Chris Valentine USA Manufacturing Coordinator: Julio Esperas Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Composition: GEX Publishing Services Kingdom, Australia, Mexico, Brazil, and Japan.
    [Show full text]
  • Why the FBI Can't Build a Case Management System
    PERSPECTIVES Why the FBI Can’t Build a Case Management System Jerome W. Israel A review of the problems that haunted the FBI’s Virtual Case File and Sentinel case management programs and an examination of the techni- cal reasons for these failures provide the basis for recommendations to help avoid their repetition. pic software engineering failures are nothing new busy tending to cost and schedule that we failed to reckon in the federal government, but for the FBI, they’re with these issues. In addition, the project was simply too particularly bitter. large, too complex, and too unruly for an organization with E From about 2001 to 2004, the bureau spent $171 minimal engineering expertise. million on the failed Virtual Case File, and it has struggled Unfortunately, the FBI isn’t alone. Many federal agen- for nearly eight years after VCF to deliver Sentinel, a $451 cies undertake large IT projects and frequently end up in million program for which the chances for success and trouble. This cannot continue. In an era of soaring budget fulfilling the original requirements grow bleaker by the deficits, government must build IT differently. day. The plan was to automate the paper processes admin- istered by the FBI’s special agents. Instead, their hopes have EARLY WARNINGS been crushed twice, forcing them to continue managing In November 2004, just as we were driving the last nails cases and evidence in ways that haven’t improved dramati- into VCF’s coffin, FBI Director Robert Mueller invited Chief cally since the days of J. Edgar Hoover.
    [Show full text]
  • Federal Bureau of Investigation's Informa- Tion Technology Modernization Pro- Gram, Trilogy Hearing Committee on Appropriation
    S. HRG. 109–76 FEDERAL BUREAU OF INVESTIGATION’S INFORMA- TION TECHNOLOGY MODERNIZATION PRO- GRAM, TRILOGY HEARING BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED NINTH CONGRESS FIRST SESSION SPECIAL HEARING FEBRUARY 3, 2005—WASHINGTON, DC Printed for the use of the Committee on Appropriations ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 20–668 PDF WASHINGTON : 2005 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON APPROPRIATIONS THAD COCHRAN, Mississippi, Chairman TED STEVENS, Alaska ROBERT C. BYRD, West Virginia ARLEN SPECTER, Pennsylvania DANIEL K. INOUYE, Hawaii PETE V. DOMENICI, New Mexico PATRICK J. LEAHY, Vermont CHRISTOPHER S. BOND, Missouri TOM HARKIN, Iowa MITCH MCCONNELL, Kentucky BARBARA A. MIKULSKI, Maryland CONRAD BURNS, Montana HARRY REID, Nevada RICHARD C. SHELBY, Alabama HERB KOHL, Wisconsin JUDD GREGG, New Hampshire PATTY MURRAY, Washington ROBERT F. BENNETT, Utah BYRON L. DORGAN, North Dakota LARRY CRAIG, Idaho DIANNE FEINSTEIN, California KAY BAILEY HUTCHISON, Texas RICHARD J. DURBIN, Illinois MIKE DEWINE, Ohio TIM JOHNSON, South Dakota SAM BROWNBACK, Kansas MARY L. LANDRIEU, Louisiana WAYNE ALLARD, Colorado J. KEITH KENNEDY, Staff Director TERRENCE E. SAUVAIN, Minority Staff Director SUBCOMMITTEE ON COMMERCE, JUSTICE, AND STATE, THE JUDICIARY, AND RELATED AGENCIES JUDD GREGG, New Hampshire, Chairman TED STEVENS, Alaska ————— PETE V. DOMENICI, New Mexico DANIEL K. INOUYE, Hawaii MITCH MCCONNELL, Kentucky BARBARA A.
    [Show full text]
  • FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress
    Order Code RL32336 CRS Report for Congress Received through the CRS Web FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress Updated August 4, 2004 Alfred Cumming Specialist in Intelligence and National Security Foreign Affairs, Defense and Trade Division Todd Masse Specialist in Domestic Intelligence and Counterterrorism Domestic Social Policy Division Congressional Research Service ˜ The Library of Congress FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress Summary The Intelligence Community, including the Federal Bureau of Investigation (FBI), has been criticized for failing to warn of the attacks of September 11, 2001. In a sweeping indictment of the FBI’s intelligence activities relating to counterterrorism and September 11, the Congressional Joint Inquiry Into the Terrorist Attacks of September 11, 2001, singled out the FBI in a significant manner for failing to focus on the domestic terrorist threat; collect useful intelligence; analyze strategic intelligence; and to share intelligence internally and with other members of the Intelligence Community. The Joint Inquiry concluded that the FBI was seriously deficient in identifying, reporting on, and defending against the foreign terrorist threat to the United States. The FBI is responding by attempting to transform itself into an agency that can prevent terrorist acts, rather than react to them as crimes. The major component of this effort is restructuring and upgrading of its various intelligence support units into a formal and integrated intelligence program, which includes the adoption of new operational practices, and the improvement of its information technology. FBI Director Robert S. Mueller, III, has introduced reforms to curb the autonomy of the organization’s 56 field offices by consolidating and centralizing FBI Headquarters control over all counterterrorism and counterintelligence cases.
    [Show full text]