The Influence of Faulty Intelligence Sharing on the 9/11 Attack

Reflect on the 9/11 attack and its influence on the homeland security function. Continuing with the scenario introduced in the Week 2 Project, assume that your Senate-candidate client intends to make homeland security a focus of his efforts and has commissioned a report to highlight key areas of need.
Prepare a report in Microsoft Word that covers the following points:
Explain the influence of faulty intelligence sharing on the 9/11 attack. Compare and contrast law enforcement information sharing before 9/11 and today.
Describe and evaluate the value of Joint Terrorism Task Forces. Select one particular JTTF to serve as an example.
Describe the individual components of the selected JTTF and provide an example of a successful operation.
Analyze the threats posed to U.S. security by illegal immigration and the challenges of border protection. Specify the several ways that insecure borders may present a threat to security, keeping in mind that terrorism may only be part of the overall picture.

  The Influence of Faulty Intelligence Sharing on the 9/11 Attack The 9/11 attack on the United States was a defining moment in history that changed the way we approach national security. One of the key factors that contributed to the success of the attack was the failure of intelligence agencies to effectively share information. The lack of communication and coordination between these agencies allowed the attackers to exploit gaps in our security system. Before 9/11, law enforcement information sharing was fragmented and hindered by bureaucratic barriers. Each agency had its own internal systems and databases, making it difficult to share crucial intelligence in a timely manner. There was a lack of standardized protocols and procedures for information sharing, resulting in a siloed approach to national security. Today, significant progress has been made in improving law enforcement information sharing. The creation of the Department of Homeland Security (DHS) following the 9/11 attack played a crucial role in enhancing collaboration and communication among various agencies. The establishment of the DHS led to the development of the Information Sharing Environment (ISE), which aims to facilitate the sharing of terrorism-related information between federal, state, local, tribal, and territorial partners. The ISE has implemented several initiatives to improve intelligence sharing, including the creation of fusion centers and the implementation of standardized information sharing protocols. Fusion centers serve as hubs for collaboration and information exchange among different agencies. They collect, analyze, and disseminate information related to terrorism and other criminal activities. Despite these improvements, challenges still exist in law enforcement information sharing. Bureaucratic obstacles and interagency rivalries can impede the timely and effective sharing of intelligence. Additionally, concerns about privacy and civil liberties can create tensions between agencies and hinder information sharing efforts. Joint Terrorism Task Forces (JTTF) Joint Terrorism Task Forces (JTTFs) are a critical component of our nation’s counterterrorism efforts. They bring together federal, state, and local law enforcement agencies to work collaboratively in identifying, investigating, and disrupting terrorist activities. JTTFs provide a platform for sharing intelligence, coordinating operations, and leveraging expertise from various agencies. One example of a successful JTTF is the New York Joint Terrorism Task Force (NYJTTF). It is one of the oldest and most well-established JTTFs in the country. The NYJTTF consists of more than 50 federal, state, and local agencies, including the Federal Bureau of Investigation (FBI), New York City Police Department (NYPD), and various other law enforcement organizations. The NYJTTF has been involved in numerous successful operations over the years. One notable operation was the investigation into the 2009 New York City subway bomb plot. The JTTF worked diligently to gather intelligence, conduct surveillance, and apprehend the individuals planning the attack. Their efforts resulted in the prevention of a potentially devastating terrorist act. Threats posed by Illegal Immigration and Border Protection Challenges Insecure borders present numerous threats to U.S. security beyond just terrorism. Illegal immigration poses challenges that must be addressed to ensure the integrity of our nation’s borders. Terrorism: Insecure borders can provide opportunities for terrorist organizations to infiltrate the country. Terrorists can exploit weak border security to smuggle weapons, funds, and personnel into the country. Drug Trafficking: Inadequate border protection allows drug cartels to smuggle illicit drugs across our borders. This contributes to the opioid crisis in the United States and fuels violence and crime within our communities. Human Trafficking: Insecure borders enable human traffickers to exploit vulnerable individuals, including women and children, for forced labor, prostitution, or other forms of exploitation. Organized Crime: Criminal organizations take advantage of porous borders to transport contraband such as counterfeit goods, illegal firearms, and stolen vehicles across international boundaries. To address these threats, comprehensive border protection measures are necessary. This includes increasing border patrol resources and technology, enhancing surveillance capabilities, improving infrastructure at ports of entry, and implementing effective immigration

Sample Answer