ADVICE+DISSENT:Intelligence File Reading the Signs

Crises occur when we have the wrong kinds of information.

One can usually expect surprises. That's a lesson to draw from the two great American crises of the first decade of the 21st century: the Sept. 11 terrorist attacks and the economic meltdown. Neither event came without warning, but few people saw the signals in advance.

And yet we see clearly, now, the discrete events that precipitated these disasters. The 9/11 commission attributed the government's blindness to a "failure of imagination." The idea here is the people who were responsible for thinking about terrorist attacks- mostly career counterterrorism staff on the National Security Council and analysts in the intelligence community- didn't think hard enough about how terrorists could attack the United States.

But that's not so. These people weren't able to name the date, or the method of the attack, but throughout the summer of 2001, their early warning systems were "blinking red," as George Tenet, then the director of Central Intelligence, told the 9/11 commission in 2004. So, why did the information available to them-which consisted mostly of intelligence reports about increased terrorist phone "chatter"-fail to alert anyone that a plot was afoot?

Well, perhaps it was the wrong kind of information. Consider the root causes of the economic crisis.

This disaster was touched off by a collapse in the market for mortgage-backed securities. (We know this now, but we failed to act at the time.) Financial firms made a killing buying up bundles of discounted mortgages and then selling shares of them to investors. When people paid off their mortgages, the securities paid returns. Many of those securities were deemed safe, quality investments by the companies that routinely grade securities and bonds.

Why? Not because the rating agencies were incapable of assessing risk. Like counterterrorism officials, they were plenty good at that. The rating agencies failed because they were using the wrong information.

The grade assigned to a mortgage-backed security depended on the likelihood that the thousands of individual borrowers who comprised those securities would default on their loans. Those people posed risk to the investors. So, the rating agencies examined historic rates of default-which they deemed tolerably low-and used them to calculate future risk.

Bad idea. Because it turns out (as we know now), those securities included a lot of loans to new borrowers, many of whom had neither the money for a down payment nor sufficient income to repay their loan. Historic data didn't account for these people, who had never taken out mortgages for a very good reason-they couldn't afford them. The rating agencies apparently never considered how these riskier borrowers would make the securities riskier, too.

In defense of the terrorist hunters, they sensed something was coming-unlike just about everyone implicated in the financial collapse. But both the Sept. 11 attacks and the economic crisis have this much in common: The people who should have predicted them failed, because they didn't have the right information.

The government responded to the attacks by gathering more information. It's hard to say whether this improves its ability stop the next terrorist strike. But this much we can say. You don't prevent disaster simply by collecting more data.

As we dig out from the ashes of the financial crisis, and we hear calls for more "transparency" and "reporting" from banks and other institutions, we might want to remember that we had a lot of information before the meltdown. But it was the wrong kind.

Shane Harris, a staff correspondent for National Journal, wrote about intelligence and technology at Government Executive for five years.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.