SLIDE 7 3/ 8/ 2007 3/ 8/ 2007
HOW THE U.S GOVERNMENT AND HOW THE U.S GOVERNMENT AND OTHER GOVERNMENTS HAVE SIMILAR OTHER GOVERNMENTS HAVE SIMILAR VULNERABILITIES VULNERABILITIES
- The U.S. and many Government
The U.S. and many Government’ ’s structures, authorities, s structures, authorities, and responsibilities are similarly segregated or aligned with and responsibilities are similarly segregated or aligned with defined roles, missions, policies, and funding lines that are defined roles, missions, policies, and funding lines that are analogous to the territorial boundaries of nation states. analogous to the territorial boundaries of nation states.
- Terrorist asymmetric threats are therefore able to operate
Terrorist asymmetric threats are therefore able to operate in these governmental gaps and seams just as they are in these governmental gaps and seams just as they are able to operate in the territorial gaps and seams of able to operate in the territorial gaps and seams of countries. countries.
The U.S. Government ’ ’s structure and authorities are s structure and authorities are contained in the National Security Act (NSA) of 1947. contained in the National Security Act (NSA) of 1947.
- The NSA of 1947 was built on a Cold
The NSA of 1947 was built on a Cold-
War paradigm of perceived conventional war and its reliance on international perceived conventional war and its reliance on international agreements founded on concepts of sovereignty. agreements founded on concepts of sovereignty.
- Governmental statutory authorities, policies, and
Governmental statutory authorities, policies, and procedures, DoD areas of responsibility for Combatant procedures, DoD areas of responsibility for Combatant Commanders, and fiscal laws governing the necessary Commanders, and fiscal laws governing the necessary funding for these endeavors are not favorably organized or funding for these endeavors are not favorably organized or structured to combat terrorist threats. structured to combat terrorist threats.