ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Books, Literature, and Writing»
  • Commercial & Creative Writing

Police Chiefs Moving to Share Terror by Broader, J M. in New York Times

Updated on April 24, 2015

From information published in the article, ‘Police Chiefs Moving to Share Terror Data’ by John M. Broader published in July 2005, it is clear that there are challenges relating to sharing of information on terror threats. One would expect that after a devastating blow like what happened when terrorists struck in September eleventh. The situation is almost the same as what was before 2001.

In the article, the reporter says federal officials as admitted by Chief William J. Bratton, were reluctant or uninterested in sharing information on terror threats. This is the reason why police chiefs from around the country were forming an informal network to enhance rapid communication of information on terrorist related incidences(Linden, 2007).

One of the key sticky issue affecting information sharing was that information from the homeland security department, though good and worthwhile, often was disseminated too late to be put to use by local police departments. The intelligence network did not work closely with the local police chiefs and did not involve them in their information sharing network. By the time information reaches the local police departments, it is often too late that no preparation time is available.

One of the issues that affect information sharing between intelligence agencies and local police revolves around difference in focus. While intelligence agencies focus on gathering information towards eventually defeating terrorism or crime, the local police have to utilize intelligence in the now and avert, prevent or contain terrorist activity. Intelligence agencies are more geared towards analyzing and understanding terrorism in terms of trends and movements while the local police was more concerned with pinpointing suspects and taking definitive action against them. Often, given local police departments are not privileged with Intelligence agencies’ advantages, local police are found of guard and have to make on the spot decisions towards troops deployment to deal with a terrorist act already taking place.

It just takes too long for the homeland security division and the federal agencies to update or avail relevant information to local police departments. The described scenario is what has led to local police departments networking with other local police department so as to form a system of gathering terrorist related information and thus take appropriate information. This kind of arrangement is seen as a preferred solution to having to wait for national intelligence networks to provide required or desired information (.Broader, 2005).

Sometimes intelligence networks stand in the way of justice by covering their contact people who are terrorists in themselves. To hide their contacts, they provide piecemeal or un-actionable information to the local police departments. Although it may work in the interest of the intelligence collecting concern; however, the danger it exposes the nation to, is more than imaginable. Some of those contact people are just as insane as the others they report about. Left undeterred or un-neutralized, they are as dangerous as any one would imagine.

The chiefs and directors at the homeland security department claim that they share as much information as possible with the local police departments. In some big cities, such as New York, Washington, and Los Angeles, the local police departments are represented in the homeland security operations team. As reported in the article, Mr. Filler, on behalf of the homeland security department did not see the necessity for a new interagency network to share data on terrorism (Broader, 2005).

Although Mr. Filler argued that a new interagency network was not necessary because the homeland department already served such a purpose, he agreed that the department did not share information as fast as the local police departments desired. The local department chiefs also acknowledge that information from the homeland security department is good enough. The issue is that the information is not timely; it is slow in coming. The reason why it takes so long before information is disseminated by homeland security department is because, the department strives towards disseminating only accurate and well researched and established information.

Therefore, the point of contention is that while local police departments were keen on being tipped on clues or development as they unveiled, the homeland security department is not keen on sharing crude, raw or unrefined information that has been tested and retested towards eliminating possible mistakes or doubts. The challenge the homeland security department faces is being able to share inconclusive information with local police departments and making sure the local police departments take the information as such i.e. raw and inconclusive i.e. bound to change.

The local police departments consider what is termed by the homeland security department as raw to be the most crucial information. Armed with such like information, they are able to be on the alert early enough. Waiting for information to pass through all intelligence channels or networks before it is declared worthy disseminating is makes the difference between survival and massacre by a terrorist gang.

The importance of local police chiefs forming a network (both local and international) for sharing information and not waiting for intelligence agencies was augmented when a second wave of transit bombings hit London. Sharing among local police departments can enhance their response thus leading to efficiency in handling terrorist incidences. Such like information or clues that inform police deployment thus a timely way of dealing with threats or incidences (Trager, 1986).

It has to be understood that intelligence networks often may also be lacking in information that the local police department can access. It is only through the local police department, homeland security department and other federal agencies sharing information properly that threats can be dealt with adequately. So far, challenges to do with intelligence not compromising their contacts while at the same time not keeping local police in the dark abound. How to deal with such issues is tricky and no solutions or efforts to provide a balance have been forth coming. Sharing of information amongst local police departments across countries and even continents is crucial. However, it would be more beneficial if at the local level all security, law enforcement and crime fighting units worked together and shared information in a timely way(Broader, 2005).

Having each local department do intelligence and infiltrate crime units in its own way while at the same time having federal agencies and intelligence networks is more likely to be unsuccessful. Difference in functions or concerns may lead to difference in methodology and approach to terrorism, but that informs why information sharing is important. Nothing has been done by either group to change or institute better information sharing mechanisms. Security agencies; federal and local remain at logger heads rather than looking at each other as complimentary outfits. To some extent, some forces see or take others for competing concerns and not complimentary groups or force. From such like an outlook; of course things remain unchanged despite the lessons that 9/11/2001 should have taught all (Trager, 1986).

References

University of Michigan Documents Centre, America's War against Terrorism
World Trade Center/Pentagon. Terrorism and the Aftermath, accessed on 2/06/2009

at http://www.lib.umich.edu/govdocs/usterror.html

Broader, J M. (2005) Police Chiefs Moving to Share Terror Data accessed on 2/06/2009 at:

http://www.nytimes.com/2005/07/29/national/nationalspecial3/29bratton.html

Trager , O. (1986). Fighting Terrorism: Negotiation Or Retaliation? Facts on File

Linden, E. V. (2007). Focus on Terrorism. Nova Publishers

Comments

    0 of 8192 characters used
    Post Comment

    • Chris Antonaros profile image

      Christos Antonaros 3 years ago from Athens, Greece

      That was really interesting ! Good work!

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: "https://hubpages.com/privacy-policy#gdpr"

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)