Изображения страниц
PDF
EPUB

public. government, and other databases to link relevant information about terrorists and

their supporters.

According to FTTTF officials, it is attempting to solve the problem of identifying possible terrorist suspects. The FTTTF is intended to co-locate data from the law enforcement and intelligence communities, and other government and non-government sources and, then, provide that information to federal, state, and local operational agencies.

FTTTF officials state that they are encouraged that the databases and interagency participation in the program have been progressing as envisioned. The FTTTF is not a separate agency, it is a multi-agency task force that is entirely staffed with detailees from different agencies. The Department of Defense's Joint Counterintelligence Assessment Group provides primary technical support to FTTTF.

FTTTF officials reported that several thousand individuals from several countries have been already identified as "abscondees" within the United States by the FTTTF. Many new addresses for “cold” abscondees were provided to the INS and the INS is now working closely with the FTTTF to identify individuals who are engaged in immigration law violations. Additionally, the FTTTF works closely with the FBI on the identification and location of terrorists and their supporters.

Executive And Congressional Recognition Of Information Sharing Issue

The events of September 11, 2001 have led to an almost universal acknowledgement in the United States Government of the need for consolidating and streamlining collection, analysis, and dissemination of information concerning threats to the United States and its interests. According to the President's National Strategy for Homeland Security ("the Strategy"), intelligence contributes to every aspect of homeland

security and is a vital foundation for the homeland security effort The Strategy recognizes that U.S. information technology is the most advanced in the world, but that our information systems have not adequately supported the homeland security missiÓN. According to the Strategy, the US government spends about $50 billion per year on information technology, but the systems purchased are not compatible between the agencies of the federal government, or with state and local entities. The Strategy also acknowledges that legal and cultural barriers often prevent agencies from exchanging and integrating intelligence and other information.

In response to these problems, the Strategy first calls for integrating information sharing across the federal government through the Critical Infrastructure Assurance Office (CIAO). Under this plan, the CIAO would design and implement an interagency information architecture to support efforts to find, track, and respond to terrorist threats. The CIAO would coordinate groups focusing on border and transportation security and other countermeasures to the use of weapons of mass destruction. As part of this effort, the FBI will create a consolidated Terrorism Watch List that includes information from both intelligence and law enforcement sources.

The Strategy also calls for integrating information sharing across state and local governments, private industry, and among the U.S. citizenry. Using modern information technology, more information is to be shared among various databases. The FBI and other agencies will augment information that currently is available in the National Crime Information Center databases and National Law Enforcement Telecommunications Systems. This information integration effort will require that Intelligence Community agencies make efforts to remove classified information from some documents in order to allow them to be shared with state and local officials.

Finally, the Strategy calls for the adoption of standards for information that is in electronic form and is relevant to homeland security. According to the Strategy, terroristrelated information from the databases of all government agencies with responsibilities for homeland security is to be integrated. The Department of Justice, FBI, and other

federal agencies, and numerous state and local law enforcement agencies, will then be able to use data-mining tools to apply this information to the homeland security mission.

Major provisions of two of the homeland security-related bills now pending before Congress would promote the sharing of critical homeland security information regarding threats between federal intelligence agencies and law enforcement agencies as well as state and local officials, sheriffs, governors, mayors, other elected officials, and other emergency responders. The bills recognize the continuing need to protect sensitive sources and collection methods by granting security clearances to appropriate state and local personnel.

The bills would also direct the President to develop procedures by which federal agencies will share homeland security information with, and receive such information from state and local personnel. Further, the bills would require information sharing systems to have the capability to transmit classified or unclassified information, have the capability to restrict delivery of information based on the recipient's need to know, and be accessible to appropriate state and local personnel.

In recent years, a number of Commissions established by the Congress have reported on the ability of the United States to respond to terrorist events and have recommended that steps be taken to encourage closer cooperation between the intelligence and law enforcement communities. The hearings of this Joint Inquiry have shown that, although there is no information to indicate with certainty that the terrorist attacks of September 11, 2001 could have been prevented, some have suggested that certain terrorist acts may have been facilitated by continuing poor information exchanges between intelligence and law enforcement agencies and by blurred lines of organizational responsibility.

One of the mechanisms established by Congress, the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, looked very closely at the issues relating to the sharing of counter terrorism intelligence

with state and local officials. The Advisory Panel was established by the National Defense Authorization Act for Fiscal Year 1999, and was chaired by then-Governor James Gilmore of Virginia who will be appearing as a witness today. The Advisory Panel issued three reports in December 1999, 2000, and 2001.

In its first report. the Advisory Panel reported that state and local officials had expressed a need for more intelligence, and for better information sharing among entities at all levels regarding potential terrorist threats. The report stated that, while the Panel was acutely aware of the need to protect classified national security information and the sources and methods by which it may have been obtained, it believed more could be done to provide timely information up, down, and laterally, at all levels of government to those who need the information to provide effective deterrence, interdiction, protection, and response to potential threats.

The Panel's second annual report stated that the potential connection between terrorism originating outside the United States and terrorist acts perpetrated inside the United States means that "foreign" terrorism may not be easily distinguished from "domestic" terrorism. The report urged that an even more comprehensive dissemination system than the JTTFs must be developed to provide information through expanded law enforcement channels for further dissemination to local response entities. In its third and final report, the Panel described the results of a survey it had commissioned that substantiated the panel's view that state and local entities are in need of threat assessments and better intelligence concerning potential terrorist activities.

The premise of the Panel throughout its work has been that all terrorist incidents are local, or at least will begin that way. The Panel recommended that a federal office for combating terrorism establish a system for providing clearances to state and local officials and that the FBI implement an analytic concept similar to the CIA's "Reports Officers" to do a better job of tracking and analyzing terrorism indicators and warnings.

GAO's Assessment Of Information Sharing

Within And Between Federal, State, And Local Agencies

The General Accounting Office has completed a number of reports for Congress that focus on combating terrorism, information sharing, and homeland security. In addition. GAO's written statement for the record for this hearing emphasizes the need for a commitment by the leadership of the FBI. CIA, and other agencies to transform the law enforcement and intelligence communities and achieve the most effective information sharing possible to combat terrorism.

GAO has confirmed that, the FBI, CIA, NSA, and other agencies have distinct organizational cultures. Also, legal walls, classification walls, and historically-ingrained walls of bureaucratic practice exist between these agencies. As GAO views the situation, only with the commitment, effectiveness and persistence of strong and visionary managers, will these walls be brought down and greater amounts of information sharing

occur.

The three problems of information sharing identified by GAO as important to resolve if national, state, and local governments are to succeed in their collective war on terrorism include fragmentation, technological impediments, and ineffective collaboration. The GAO's assessment regarding the importance of technological impediments is supported by the FBI's inability to share information among its field offices and headquarters and with other agencies. The problem of information fragmentation is also illustrated by the fact that the intelligence office at the Federal Aviation Administration now at the Transportation Security Administration (TSA)-received information indicating that reputed terrorist bomber Ahmed Ressam had been arrested while trying to enter the United States from Canada with the intent of bombing the Los Angeles International Airport. It then issued an analysis of the bomb equipment seized, but this analysis was not directly shared with the Intelligence Community at the same time that it was released to the airports and the airlines.

« ПредыдущаяПродолжить »