Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Case # : Federal Bureau of Investigation

(a) Identification of Central Issue


The FBI was criticized for not sharing information, a failure that has been blamed on a variety of
shortcomings, including culture, an absence of information sharing strategy, technological
problems and legal & policy constraints. The flow of information remains largely one way --
from the local and state levels to the FBI. As per the case, the sharing remains haphazard and
still overly dependent on the ad hoc network of personal relations among known colleagues. It
is not the result of a carefully considered network architecture that optimizes the abilities of all
of the players. The existing system of counterterrorism information sharing is too centralized
and federal government-centric. Also there is an ineffective information and intelligence
sharing program, analytical weaknesses and lack of established policies and procedures that
delineate the appropriate processes to be used to share information and intelligence, either
internally or externally.
(b) Analysis of data, events, statements, etc., to build the big picture and arrive at the
root cause/s of the problem

(c) Approaches/designs to address the root cause

1. FBI has to reinvent itself to meet the requisite in present scenario of terrorism.
2. Organizational structure to be made cross functional structure than silo type functional
structure
3. Performance measurement system to be aligned as per job roles and responsibilities
4. Retention of talent pool with attractive compensation
5. Layering of intelligence report based on its confidence level and maturity
6. Visibility of these layered information to Counter Terrorism Division.
7. Higher focus on Analytical Tools for information analysis
8. Upgradation of data communication, IT infrastructure and high speed data
communication network on dedicated line which may support more the investigation
teams.
9. Single information FBI Analyst to assess the threat environment
10. One data portal system to be used for all purpose.
11. More coordination with other intelligence wing like CIA and sharing of threat
information among all partners.

Submitted by: Group 12

You might also like