Experts urge better information-sharing

A proposed national commission to study the events of Sept. 11 must examine whether better information sharing and coordination throughout the federal government might have helped prevent the attacks, several members of past terrorism-related commissions told the Senate Governmental Affairs Committee on Thursday.

"Because of the classification of information -- and, perhaps, some plain confusion -- we do not yet have a full and integrated picture of exactly what went wrong," Richard Betts, director of War and Peace Studies at Columbia University, said during a hearing on legislation, S. 1867, to establish the National Commission on Terrorists Attacks Upon the United States.

Betts served on the National Commission on Terrorism, which completed its investigation in June 2000. He said Sept. 11 was a "watershed in national security policy, and figuring out and adjusting to the lessons will be a long process."

Committee Chairman Joseph Lieberman, a Connecticut Democrat who co-sponsored the bill with Arizona Republican John McCain, said one lesson the nation must learn is whether "possible systemic deficiencies in our counter-terrorism capabilities, our immigration and border control, and even our diplomatic activities" might have prevented U.S. officials from predicting and thwarting the attacks.

"Clearly the nation's future security would benefit from such a commission," Lieberman said. Maurice Sonnenberg, who serves as senior international adviser for Bear, Stearns & Co. and also served as vice chairman of the National Commission on Terrorism, said a comprehensive analysis of the Sept. 11 attacks should focus on the role of several governmental institutions, including the White House, Congress and the Justice Department. It also should investigate any "impediments" to law enforcement, border control and intelligence sharing, he said.

Dave McCurdy, president of the Electronic Industries Alliance, said the commission also would need to determine whether the government is using technology to its "fullest potential" in order to effectively manage information--and rise to the challenge of a new kind of war.

"The September 11 attacks were brilliantly evil. They were entirely 'outside the box' of what we thought likely," said McCurdy, who served in the House for 14 years and on a commission that examined ways to prevent the proliferation of weapons of mass destruction. "Now it is our turn to adapt. To win this new war, government must change how it thinks and acts and do a much better job of coordinating its assets."

Sonnenberg said a report from the proposed Lieberman-McCain commission, "if well-written and carefully conceived," could go a long way to help the government make those types of changes. "The cynics will say all these commission reports wind up on the shelf," Sonnenberg said. "Most do. There is, however, a great difference regarding this one. It is post-September 11."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.