Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
9 11 Commission Report — Part 3
Page 57
57 / 81
~ INFORMATION
TECHNOLOGY
The foundation of a centralized and effective counterterrorism operation 1s the capability to
assemble, assimilate, and disseminate investigative and operational information both internally
and with fellow intelligence and law enforcement agencies. This capability requires information
technology (/T) that makes information easily accessible and usable by all personnel while protecting
the security of that inforrnation.
On September 11, 2001, the Bureau's information technology was inadequate to support its
counterterrorism mission. In preceding years, substantial investments were made to upgrade
technologies that directly supported investigations, such as surveillance equipment and forensic
services like the Integrated Automated Fingerprint Identification System. insufficient attention was
paid, however, to technology related to the more fundamental tasks of records creation, maintenance,
dissemination, and retrieval. In 2001, many employees still used vintage 1987 386 desktop
computers. Some resident agencies could only access data in their field office wa a slow dral-
up connection, Many Bureau programs were using computer systems that operated independently
and did not interoperate with systems in other programs or other parts of the Bureau.
We also had a deficient information management system. The FBI’s legacy investigative information
system, the Autornated Case Support (ACS), was not very effective in identifying information or
supporting investigations. Users navigated with the function keys instead of the “point and click”
method common to web-based applications, Simple tasks, such as storing an electronic. version
of a document, required a user to perform 12 separate functions ina "green screen" environment.
Also, the system lacked multimedia functionality to allow for the storage of information in its original
form. Agents could not store many forms of digital evidence in an electronic format, instead having
to describe the evidence and indicate where the evidence was stored in a contral room
Thanks to the character and resolve of its personnel, the FB! was able to achieve numerous
investigative successes, in spite of these obstacles. It was clear as of September 11, 2001,
however, that we needed an integrated IT infrastructure to manage our information. We brought
on-board a highly skilled team of experts and set out to create an IT infrastructure that 1s fast and
secure, and that ties together the applications and databases used throughout the Bureau. We
also designed user-friendly, web-based software applications to reduce reliance on paper records
and to streamline investigative workflow. These improvements are enhancing our ability to collect,
store, search, analyze, and share information.
Centralized Management
The shortcomings of the FBI’s IT prior to September 11, 2001, were due in part to a
lack of centralized management. Decisions related to IT were made at various levels and by
various divisions throughout the Bureau with no overarching strategy or plan. To correct this
problem and ensure that future decisions related to IT are consistent with a clear plan to meet
sc DOC. #5 51 - 000000390
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic