Attack at Fort Hood: Experiences and Suggestions for Security William P

Total Page:16

File Type:pdf, Size:1020Kb

Attack at Fort Hood: Experiences and Suggestions for Security William P Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2017 Attack at Fort Hood: Experiences and Suggestions for Security William P. Moravits Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons, and the Teacher Education and Professional Development Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by William Moravits has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Richard DeParis, Committee Chairperson, Public Policy and Administration Faculty Dr. Eliesh Lane, Committee Member, Public Policy and Administration Faculty Dr. Paul Rutledge, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2017 Abstract Attack at Fort Hood: Experiences and Suggestions for Security by William Phillip Clark Moravits MA, Texas State University, 2013 BA, Texas A&M University, 2000 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University November 2017 Abstract In the past 8 years, at least 4 lone wolf terrorists have targeted military bases or recruiting centers in the United States and research suggests attack on the US military are increasing globally. The problem was that research had not addressed the lived experiences of survivors of lone wolf attacks or how they could inform procedures regarding a sense of security for military men and women. The purpose of this research was to establish a need to address threats to the security of the military from these attacks, to provide a rich description of survivors’ experiences of the attack at Fort Hood, and to identify suggestions for improving military personnel’s sense of security while on base. Using the community based approach to public health, the central research question asked how the lived experiences of survivors of the attack at Fort Hood could lead to an increased sense of security on base. This phenomenological research provided a detailed description of survivors’ experiences and their reflections on improving military personnel’s sense of security. The population consisted of the 31 soldiers injured in the attack. A purposeful sample was used to recruit 5 participants for researcher-constructed interviews. I analyzed data and used NVivo 11 for organization. The study revealed high levels of stress, hyperawareness, and significant negative changes in the lives of these soldiers. The finding suggest an increased show of force by police throughout the base, a designated office to anonymously report suspicious activity, and more training to help soldiers cope with the experiences of combat related trauma. The implications for social change include an increased sense of security for military personnel, better training for dealing with combat related trauma, and deterrents for future lone wolf attacks. Attack at Fort Hood: Experiences and Suggestions for Security by William Phillip Clark Moravits MA, Texas State University, 2013 BA, Texas A&M University, 2000 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University November 2017 Dedication This dissertation is dedicated to my wife, Rosie. She has been an inspiration to me and a source of great strength in my academic journey. It was her love and support that convinced me to pursue a doctoral degree. It was her steadfast faith in me that allowed me to complete the journey when at times I felt like I would never get here. Her patience, encouragement, and love have been irreplaceable to me over the past four and a half years. I will be forever in her debt. I love you, mi Corazon. I would also like to offer a very special thank you and dedication to the five individuals who took part in this research. Your sacrifice, heroism, and willingness to offer your time to a stranger are greatly appreciated and will never be forgotten. I am so very grateful. May God Bless you all. Acknowledgments I want to offer my sincere thanks to all of the wonderful faculty at Walden University, with special thanks to Dr. Rich DeParis, Dr. Eliesh Lane, and Dr. Paul Rutledge, who served as my chair, committee member, and URR, respectively. Their support and guidance have been invaluable to me during my educational journey and dissertation process. In addition, I would like to thank Dr. Kenneth Grasso of Texas State University. He served as my master’s chair and positively influenced my academic career in a substantial way. I also want to offer my sincere thanks to my parents and step-parents; George and Shirley; and Michael and Sharon, who have always encouraged my academic endeavors and instilled a strong work ethic in me. They served as great examples of lifelong learners. Your influences on me have been greatly appreciated. Table of Contents List of Tables ..................................................................................................................... iv Chapter 1: Introduction to the Study ....................................................................................1 Background of the Study ...............................................................................................2 Problem Statement .........................................................................................................5 Purpose of the Study ......................................................................................................6 Research Questions ........................................................................................................7 Conceptual Framework ..................................................................................................7 Nature of the Study ........................................................................................................9 Definitions....................................................................................................................10 Assumptions .................................................................................................................11 Scope and Delimitations ..............................................................................................12 Limitations ...................................................................................................................13 Significance of the Study .............................................................................................15 Significance to Practice......................................................................................... 16 Significance to Theory .......................................................................................... 17 Significance to Social Change .............................................................................. 18 Summary ......................................................................................................................18 Chapter 2: Literature Review .............................................................................................20 Literature Search Strategy............................................................................................21 Conceptual Framework ................................................................................................21 Literature Review.........................................................................................................22 i Summary ......................................................................................................................60 Chapter 3: Research Method ..............................................................................................62 Research Design and Rationale ...................................................................................62 Role of the Researcher .................................................................................................64 Methodology ................................................................................................................66 Participant Selection Logic ................................................................................... 66 Instrumentation ..................................................................................................... 69 Procedures for Participation and Data Collection ................................................. 72 Data Analysis Plan ................................................................................................ 73 Issues of Trustworthiness .............................................................................................77 Credibility ............................................................................................................. 77 Transferability ....................................................................................................... 77 Dependability .......................................................................................................
Recommended publications
  • The Social Roots of Islamist Militancy in the West
    Valdai Papers #21 | July 2015 The Social Roots of Islamist Militancy in the West Emmanuel Karagiannis The Social Roots of Islamist Militancy in the West Introduction The phenomenon of Islamist militancy in the West has preoccupied the public, media and governments. The September 11 events aggravated the already strained relations between the West and the Muslim world. The fact that the perpetrators of the terrorist attacks were Muslims, who had travelled to the United States from European cities, brought the Old Continent’s Islamic communities to the spotlight. The homegrown Madrid and London bombings on March 11, 2004 and July 7, 2005, respectively, only confirmed in the eyes of some people the untrustworthiness of European Muslims. In the United States, there have also been some high-profile cases of jihadi attacks or plots in the post-9/11 period (e.g. the 2003 Brooklyn Bridge plot, 2009 Fort Hood shooting). While these attacks and plots were different from each other, they can be classified as cases of Islamist militancy. For the purpose of this study, Islamist militancy will be defined as the aggressive and often violent pursuit of a cause associated with Islam. Although it is very difficult to know precisely the number of Western Muslims who have been recruited by jihadi groups, a survey conducted by the Nixon Center revealed that there were 212 suspected and convicted terrorists implicated in North American and Western Europe between 1993 and 2003.1 In addition, Edwin Bakker’s study identified 242 individual cases of jihadi terrorists in Europe during 2001-2006.2 Most recently, there has been a resurgence of Islamist violence in Europe, Australia, Canada and the United States.
    [Show full text]
  • Hood Shooting Survivors to Face Gunman at Trial
    • DOAAarmyaaN'T MISS: • ArmArmy • • Army Times August 5, 2013 • Photo gallery: Hood shooting survivors to face gunman at trial Aug. 5, 2013 - 06:00AM | 2 Comments Unknown Formatted: Font:(Default) Helvetica, 12 pt, Font color: Custom Color(RGB(44,44,44)) Retired Staff Sgt. Alonzo Lunsford holds one of the bullets removed from his body after he was wounded in the 2009 Fort Hood shooting rampage. Unknown Formatted: Font:(Default) Helvetica, 12 0 pt, Font color: Custom Color(RGB(44,44,44)), Hidden By Ramit Plushnick-Masti and Allen G. Breed The Associated Press Unknown Formatted: Font:(Default) Helvetica, 12 pt, Font color: Custom Color(RGB(44,44,44)) Zoom In a June 4 photo at his home in Lillington, N.C., retired Staff Sgt. Alonzo Lunsford describes his wounds from the 2009 Fort Hood shooting rampage. (Chuck Burton/AP) Key questions about Fort Hood shooting trial DALLAS – Maj. Nidal Hasan will stand trial in a court-martial that starts Tuesday for the shooting rampage at Fort Hood that left 13 people dead and more than 30 people wounded at the Texas Army post on Nov. 5, 2009. Here are some details about the case so far and what to expect from the trial: What charges does Hasan face? Hasan faces 13 specifications of premeditated murder and 32 specifications of attempted premeditated murder under the Uniform Code of Military Justice. If convicted, he would face the death penalty. Why has the case taken so long to prosecute? Judges in the case have granted a series of delays for preparation or other issues, often at the request of Hasan or his attorneys.
    [Show full text]
  • Muslim-American Terrorism in the Decade Since 9/11
    Muslim-American Terrorism in the Decade Since 9/11 CHARLES KURZMAN DEPARTMENT OF SOCIOLOGY UNIVERSITY OF NORTH CAROLINA, CHAPEL HILL FEBRUARY 8, 2012 Muslim-American Terrorism Down in 2011 This is the third annual report on Muslim‐American terrorism suspects and perpetrators published by the Twenty Muslim-Americans were indicted for Triangle Center on Terrorism and Homeland Security. violent terrorist plots in 2011, down from 26 the year before, bringing the total since 9/11 The first report, co‐authored by David Schanzer, to 193, or just under 20 per year (see Figure Charles Kurzman, and Ebrahim Moosa in early 2010, 1). This number is not negligible -- small also examined efforts by Muslim‐Americans to prevent numbers of Muslim-Americans continue to radicalization. The second report, authored by Charles radicalize each year and plot violence. Kurzman and issued in early 2011, also examined the However, the rate of radicalization is far less source of the initial tips that brought these cases to the than many feared in the aftermath of 9/11. In attention of law‐enforcement authorities. This third early 2003, for example, Robert Mueller, director of the Federal Bureau of Investigation, report, authored by Charles Kurzman and issued in told Congress that “FBI investigations have early 2012, focuses on cases of support for terrorism, revealed militant Islamics [sic] in the US. We in addition to violent plots. These reports, and the data strongly suspect that several hundred of these on which they are based, are available at 1 extremists are linked to al-Qaeda.” http://kurzman.unc.edu/muslim‐american‐terrorism.
    [Show full text]
  • History – 2000 Thru 2014
    This Time in History NOTABLE EVENTS IN WORLD/U.S. HISTORY - CONTINUED 2000 - 2014 2008 Oil prices in the U.S. hit a record $147 per barrel IMMANUEL MILESTONES Global financial crisis - stock market crashed 2006 Pre-school added to school 2009 Fort Hood shooting - 12 servicemen killed, 31 injured An association formed with Grace Church in Hutchinson, thus Immanuel H1N1 (swine flu) global pandemic Lutheran School and Children of Grace Pre-School 2010 Deepwater Horizon oil spill - 4.9 million barrels of oil spilt into the Gulf of Mexico Pastors 2011 Gabrielle Giffords, U.S. Representative, shot & critically injured in Tucson, Ronald Siemers (1995-2001) Daniel Reich (2001-present) AZX, 6 others killed Principals/Teachers Osama bin Laden, U.S. most wanted terrorist, killed by U.S. Navy Seals in Timothy Schuh (1997-2006) Cheryl Schuh (1997-2006) Pakistan Koreen Koehler (2000-2002) Leanne Reich (2002-2004) A nuclear catastrophe in Tokyo resulted from a 9.0 earthquake in Japan Justin Groth (2006-2010) Heidi Groth (2006-2010) One of the deadliest tornado season known in U.S. history - amongst the most Kristin (Slovik) Utsch (2008-present) Alex Vandenberg (2010-present) devastating was in Joplin, MO Stephanie Vandenberg (2010-present) 2012 Hurricane Sandy caused devastation along the east coast - 132 deaths; $82 billion in damages WELS/LUTHERAN KEYPOINTS Sandy Hook Elementary School shooting in Newtown, CT - killed 26 people 2001 Time of Grace began airing on TV of which 20 were children between the ages of 6 and 7 2008 Christian Worship Supplement published 2013 Boston Marathon Bombings - two pressure cookers used in explosions; killed U.S.
    [Show full text]
  • COMBAT STRESS Harnessing Post-Traumatic Stress for Service Members, Veterans, and First Responders
    The American Institute of Stress COMBAT STRESS Harnessing Post-Traumatic Stress for Service Members, Veterans, and First Responders Volume 8 Number 3 Fall 2019 Fort Hood Massacre Tenth Anniversary Nothing has changed: Still Workplace Violence AND the Escalating Epidemic of Veteran Suicides. The mission of AIS is to improve the health of the The mission of AIS is to improve the health of the community and the world by setting the standard of community and the world by setting the standard of excellence of stress management in education, research, excellence of stress management in education, research, clinical care and the workplace. Diverse and inclusive, clinical care and the workplace. Diverse and inclusive, The American Institute of Stress educates medical The American Institute of Stress educates medical practitioners, scientists, health care professionals and practitioners, scientists, health care professionals and the public; conducts research; and provides information, the public; conducts research; and provides information, training and techniques to prevent human illness related training and techniques to prevent human illness related to stress. to stress. AIS provides a diverse and inclusive environment that AIS provides a diverse and inclusive environment that fosters intellectual discovery, creates and transmits fosters intellectual discovery, creates and transmits innovative knowledge, improves human health, and innovative knowledge, improves human health, and provides leadership to the world on stress related topics. provides leadership to the world on stress related topics. Harnessing Post-Traumatic Stress for Service Members, Veterans, and First Responders COMBAT STRESS We value opinions of our readers. Please feel free to contact us with any comments, suggestions or inquiries.
    [Show full text]
  • American Jihadist Terrorism: Combating a Complex Threat
    American Jihadist Terrorism: Combating a Complex Threat /name redacted/ Specialist in Organized Crime and Terrorism February 19, 2014 Congressional Research Service 7-.... www.crs.gov R41416 CRS Report for Congress Prepared for Members and Committees of Congress American Jihadist Terrorism: Combating a Complex Threat Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, lawful permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. There is an “executive summary” at the beginning that summarizes the report’s findings. Congressional
    [Show full text]
  • Terrorist Watch List Screening and Background Checks for Firearms
    Terrorist Watch List Screening and Background Checks for Firearms William J. Krouse Specialist in Domestic Security and Crime Policy May 1, 2013 Congressional Research Service 7-5700 www.crs.gov R42336 CRS Report for Congress Prepared for Members and Committees of Congress Terrorist Watch List Screening and Background Checks for Firearms Summary The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and background checks for firearms through the National Instant Criminal Background Check System (NICS). Pursuant to the Brady Handgun Violence Prevention Act (P.L. 103-159), in November 1998 the Federal Bureau of Investigation (FBI) activated NICS for the purposes of determining an individual’s firearms transfer and possession eligibility whenever a private person seeks to acquire a firearm from a federally licensed gun dealer. Prior to February 2004, however, the FBI did not conduct terrorist watchlist queries as part of firearms background checks because being a known or suspected terrorist was not a disqualifying factor for firearms transfer and possession eligibility; nor is it today under current law. Similarly, the April 15, 2013, Boston Marathon bombing could generate renewed interest in terrorist watchlist screening, because at least one of the alleged perpetrators was possibly entered into the National Counterterrorism Center’s (NCTC’s) Terrorist Identities Datamart Environment (TIDE). As a consequence, he was possibly watch-listed in the FBI-led Terrorist Screening Center’s Terrorist Screening Database—the U.S. government’s master watchlist of known and suspected terrorists. In addition, on April 18, 2013, both alleged perpetrators—Tamerlan and Dzhokhar Tsarnaev—are further alleged to have shot and killed a police officer, high-jacked an automobile and taken its owner hostage at gunpoint, and engaged in a subsequent shootout with police.
    [Show full text]
  • Explaining the Lack of an American Domestic Counter-Radicalization Strategy
    Explaining the Lack of an American Domestic Counter-radicalization Strategy Lorenzo Vidino Over the last ten years, many countries throughout the world have sharpened their approaches to countering extremism and terrorism. Basing their judgment on direct experience and academic studies, many governments have come to reject the more simplistic assumptions about radicalization. Few believe that terrorists are innately deviant, born destined to become terrorists or that once a terrorist, always a terrorist. On the contrary, it is widely believed that, in at least some cases, the radicalization process that leads people to carry out acts of politically motivated violence can be prevented or even reversed. Working from these revised assumptions, several countries have created counter-radicalization programs that differ markedly in their extents and aims. Counter-radicalization commonly includes three types of programs, each with a distinctive objective: deradicalization, disengagement, and radicalization prevention.1 Deradicalization measures seek to lead an already radicalized individual to abandon his or her militant views. Disengagement entails a less dramatic shift whereby an individual abandons involvement in a terrorist group or activities while perhaps retaining a radical worldview. Radicalization prevention measures seek to prevent the radicalization process from taking hold in the first place and generally target a segment of society rather than a specific individual. Certain Muslim-majority countries, having been the first targets of al Qaeda or al Qaeda– inspired attacks, have been among the first to engineer counter-radicalization programs, focusing mostly on deradicalization and disengagement. The programs implemented in Saudi Arabia and Indonesia, for example, have attracted the attention of experts and policymakers for their innovative approaches.
    [Show full text]
  • 13Mar Mbunn Keynote.Pdf
    KEYNOTE MATTHEW BUNN Professor of Practice, Harvard University's John F. Kennedy School of Government UNITED STATES OF AMERICA A Worst Practices Guide to Preventing Leaks, Attacks, Theft, and Sabotage Matthew Bunn (with Scott D. Sagan) Insider Threat Mitigation Brussels, Belgium March 12-14, 2019 Insider Threats are the Most Dangerous Nuclear Security Problem • The known HEU and Pu thefts, and most sabotages, involved insiders • More real incidents than people often recognize • Insiders have authorization to go through many layers of the security system • Insiders are known colleagues • Insiders may understand key aspects of facility operations and the facility’s security system • Can learn from both nuclear and high-security non-nuclear cases 4 Recent U.S. Examples: Insiders Charged with Spying, Preparing to Kill • February 2019: Monica Witt (Fatemah Zarah), indicted for spying for Iran • 10-yr Air Force intelligence veteran (and later contractor) • Allegedly helped target U.S. agents, revealed a SIGINT program • Defected to Iran in 2013 • February 2019: Lt. Christopher Hasson, arrested, charged with plotting domestic terrorism • >20 yrs in Coast Guard • Allegedly lanned to kill leading left- leaning political, media figures • 2017 letter: “dreaming of a way to kill almost every last person” Monica Witt, Christopher Hasson 5 • Insider position apparently not used Source: U.S. Justice Department A Recent Example: Insider Sabotage and a Cleared Terrorist at Doel-4 • August 2014: An insider at Doel-4 reactor in Belgium drains lubricant,
    [Show full text]
  • SIGINT for Anyone
    THE ORIGINS OF AMERICA’S JIHADISTS THE ORIGINS OF AMERICA’S About This Perspective The U.S. homeland faces a multilayered threat from terrorist organizations. Homegrown jihadists account for most of the terrorist activity in the United States since 9/11. Efforts by jihadist terrorist organizations to inspire terrorist attacks in the United States have thus far yielded meager results. No American jihadist group has emerged to sustain a terrorist campaign, and there is no evidence of an active jihadist underground to support a continuing terrorist holy war. The United States has invested significant resources in THE ORIGINS OF preventing terrorist attacks, and authorities have been able to uncover and thwart most of the terrorist plots. This Perspective identifies 86 plots to carry out terrorist attacks and 22 actual attacks since 9/11 involving 178 planners and perpetrators. Eighty-seven percent of those planners and perpetrators had long residencies in the United States. Only four of them had come to the United States illegally, all as minors. Nationality is a poor predictor of later terrorist activity, and vetting people coming to the United States, no matter how rigorous, cannot identify those who radicalize here. Determining whether a young teenager might, more than 12 years later, turn out to be a jihadist AMERICA’S terrorist would require the bureaucratic equivalent of divine foresight. Jenkins JIHADISTS Brian Michael Jenkins $21.00 ISBN-10 0-8330-9949-3 ISBN-13 978-0-8330-9949-5 52100 C O R P O R A T I O N www.rand.org Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE C O R P O R A T I O N 9 780833 099495 R PE-251-RC (2017) barcode_template_CC15.indd 1 10/17/17 12:00 PM Contents Summary of Key Judgments ..................................................................................1 The Origins of America’s Jihadists .........................................................................3 Appendix .............................................................................................................
    [Show full text]
  • Military Law Review, Volume 223, Issue 3, 2015
    Volume 223 Issue 3 2015 U.S. DEP’T OF ARMY PAMPHLET 27-100-223-3 PAMPHLET ARMY OF DEP’T MILITARY LAW REVIEW ARTICLES OUT OF FOCUS: EXPANDING THE DEFINITION OF CHILD PORNOGRAPHY IN THE MILITARY Major Kenneth W. Borgnino MILITARY LAW REVIEW LAW MILITARY THE SEARCH FOR STATUS: CHARTING THE CONTOURS OF COMBATANT STATUS IN THE AGE OF ISIS Lieutentant Colonel R. Aubrey Davis III HUMANITARIAN INTERVENTION IN SYRIA: IS CRISIS RESPONSE AND LIMITED CONTINGENCY OPERATIONS THE SOLUTION? Major William D. Hood THE CODE INDICTED: WHY THE TIME IS RIGHT TO IMPLEMENT A GRAND JURY PROCEEDING IN THE MILITARY Major John G. Doyle JUS IN BELLO FUTURA IGNOTUS: THE UNITED STATES, THE INTERNATIONAL CRIMINAL COURT, AND THE UNCERTAIN FUTURE OF THE LAW OF ARMED CONFLICT Lieutenant Colonel James T. Hill BECOMING A HARDER TARGET: UPDATING MILITARY FIREARMS POLICIES TO COMBAT ACTIVE SHOOTERS Major Anthony M. Osborne VOLUME 223 • 2015 Department of the Army Pamphlet 27-100-223-3 Military Law Review Volume 223 Issue 3 2015 CONTENTS Articles Out of Focus: Expanding the Definition of Child Pornography in the Military Major Kenneth W. Borgnino 499 The Search for Status: Charting the Contours of Combatant Status in the Age of ISIS Lieutenant Colonel R. Aubrey Davis III 556 Humanitarian Intervention in Syria: Is Crisis Response and Limited Contingency Operations the Solution? Major William D. Hood 610 The Code Indicted: Why the Time is Right to Implement a Grand Jury Proceeding in the Military Major John G. Doyle 629 Jus in Bello Futura Ignotus: The United States, the International Criminal Court, and the Uncertain Future of the Law of Armed Conflict Lieutenant Colonel James T.
    [Show full text]
  • Intelligence Issues for Congress
    Intelligence Issues for Congress Marshall Curtis Erwin Analyst in Intelligence and National Security April 23, 2013 Congressional Research Service 7-5700 www.crs.gov RL33539 CRS Report for Congress Prepared for Members and Committees of Congress Intelligence Issues for Congress Summary To address the challenges facing the U.S. intelligence community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. In December 2004, the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458) was signed, providing for a Director of National Intelligence (DNI) with authorities to manage the national intelligence effort. The legislation also established a Director of the Central Intelligence Agency (CIA). Making cooperation effective presents substantial leadership and managerial challenges. The needs of diverse intelligence “consumers” must all be met, using many of the same systems and personnel. The DNI has substantial statutory authorities to address these issues, but the organizational relationships remain complex, especially for intelligence agencies that are part of the Defense Department. Members of Congress in their oversight role may seek to observe the extent to which effective coordination is accomplished. The intelligence community, which comprises 17 agencies, has experienced a decade of budgetary growth. That era was typified by (1) institution building with embryonic organization such as the Office of the DNI and other new or evolving intelligence components, (2) information sharing and collaboration across those institutions, and (3) a focus on counterterrorism. While those issues will remain areas of congressional interest, Members will likely confronted by a new set of intelligence challenges resulting from budgetary realities and from second-order effects stemming from post-9/11 changes.
    [Show full text]