Intelligence Information Sharing: Final Report and Recommendations

Intelligence Information Sharing: Final Report and Recommendations PDF Author: National Advisory Council
Publisher:
ISBN: 9781481966696
Category : Political Science
Languages : en
Pages : 236

Get Book Here

Book Description
The National Infrastructure Advisory Council (NIAC) set out to determine whether the right people are receiving the right intelligence information at the right time to support robust protection and resilience of the Nation's critical infrastructure. More than 200 interviews and extensive open-source research uncovered a wealth of insights on this complex problem. First, there have been marked improvements in the sharing of intelligence information within the Federal Intelligence Community, and between the Federal Government and regions, States, and municipalities. However, this level of improvement has not been matched in the sharing of intelligence information between the Federal Government and private sector owners and operators of critical infrastructure. Despite some notable successes, this bidirectional sharing is still relatively immature, leaving a large gap between current practices and an optimal system of effective public-private intelligence information sharing. We observe that trust is the essential glue to make this public-private system work. Trust results when partner capabilities are understood and valued, processes are tailored to leverage these capabilities, and these processes are tested and proven valuable to all partners. When breakdowns in information sharing occur, it erodes trust and is counterproductive to risk management. Information sharing is perhaps the most important factor in the protection and resilience of critical infrastructure. Information on threats to infrastructure and their likely impact underlies nearly every security decision made by owners and operators, including which assets to protect, how to make operations more resilient, how to plan for potential disasters, when to ramp up to higher levels of security, and how to respond in the immediate aftermath of a disaster. We looked at intelligence information flowing from the Federal Government to critical infrastructure owners and operators as well as risk information flowing from critical infrastructure owners and operators to the government. Our study reveals the complex ways information is gathered, analyzed, packaged, and shared among the owners and operators of critical infrastructures. In tackling this complex subject, we examined the different stages of the intelligence cycle, including requirements generation, information collection, analysis, and dissemination. To gather a variety of perspectives, we conducted extensive interviews with security directors, chief executives, subject matter experts, and government executives and managers. Recognizing that distinct sector characteristics shape information sharing needs, we conducted case studies of five sectors: Commercial Facilities, Healthcare and Public Health, Energy (Oil and Natural Gas), Banking and Finance, and Chemical. While we found some information sharing approaches to be effective, others were not. As a result, we adopted a "capability maturity approach," which acknowledges that different Federal agencies have different abilities to share information effectively, and we sought to build on what is working. The Administration requested that the NIAC examine three specific topics in this study: Review the overall progress and status of bi-directional intelligence information sharing. Examine ways to improve the private sector role in counterintelligence. Assess the role of fusion centers as a mechanism for sharing intelligence information with the private sector.

Intelligence Information Sharing: Final Report and Recommendations

Intelligence Information Sharing: Final Report and Recommendations PDF Author: National Advisory Council
Publisher:
ISBN: 9781481966696
Category : Political Science
Languages : en
Pages : 236

Get Book Here

Book Description
The National Infrastructure Advisory Council (NIAC) set out to determine whether the right people are receiving the right intelligence information at the right time to support robust protection and resilience of the Nation's critical infrastructure. More than 200 interviews and extensive open-source research uncovered a wealth of insights on this complex problem. First, there have been marked improvements in the sharing of intelligence information within the Federal Intelligence Community, and between the Federal Government and regions, States, and municipalities. However, this level of improvement has not been matched in the sharing of intelligence information between the Federal Government and private sector owners and operators of critical infrastructure. Despite some notable successes, this bidirectional sharing is still relatively immature, leaving a large gap between current practices and an optimal system of effective public-private intelligence information sharing. We observe that trust is the essential glue to make this public-private system work. Trust results when partner capabilities are understood and valued, processes are tailored to leverage these capabilities, and these processes are tested and proven valuable to all partners. When breakdowns in information sharing occur, it erodes trust and is counterproductive to risk management. Information sharing is perhaps the most important factor in the protection and resilience of critical infrastructure. Information on threats to infrastructure and their likely impact underlies nearly every security decision made by owners and operators, including which assets to protect, how to make operations more resilient, how to plan for potential disasters, when to ramp up to higher levels of security, and how to respond in the immediate aftermath of a disaster. We looked at intelligence information flowing from the Federal Government to critical infrastructure owners and operators as well as risk information flowing from critical infrastructure owners and operators to the government. Our study reveals the complex ways information is gathered, analyzed, packaged, and shared among the owners and operators of critical infrastructures. In tackling this complex subject, we examined the different stages of the intelligence cycle, including requirements generation, information collection, analysis, and dissemination. To gather a variety of perspectives, we conducted extensive interviews with security directors, chief executives, subject matter experts, and government executives and managers. Recognizing that distinct sector characteristics shape information sharing needs, we conducted case studies of five sectors: Commercial Facilities, Healthcare and Public Health, Energy (Oil and Natural Gas), Banking and Finance, and Chemical. While we found some information sharing approaches to be effective, others were not. As a result, we adopted a "capability maturity approach," which acknowledges that different Federal agencies have different abilities to share information effectively, and we sought to build on what is working. The Administration requested that the NIAC examine three specific topics in this study: Review the overall progress and status of bi-directional intelligence information sharing. Examine ways to improve the private sector role in counterintelligence. Assess the role of fusion centers as a mechanism for sharing intelligence information with the private sector.

National Infrastructure Advisory Council Intelligence Information Sharing Final Report and Recommendations

National Infrastructure Advisory Council Intelligence Information Sharing Final Report and Recommendations PDF Author:
Publisher: Jeffrey Frank Jones
ISBN:
Category :
Languages : en
Pages : 228

Get Book Here

Book Description
Executive Summary The National Infrastructure Advisory Council (NIAC) set out to determine whether the right people are receiving the right intelligence information at the right time to support robust protection and resilience of the Nation’s critical infrastructure. More than 200 interviews and extensive open-source research uncovered a wealth of insights on this complex problem. First, there have been marked improvements in the sharing of intelligence information within the Federal Intelligence Community, and between the Federal Government and regions, States, and municipalities. However, this level of improvement has not been matched in the sharing of intelligence information between the Federal Government and private sector owners and operators of critical infrastructure. Despite some notable successes, this bi-directional sharing is still relatively immature, leaving a large gap between current practices and an optimal system of effective public-private intelligence information sharing. We observe that trust is the essential glue to make this public-private system work. Trust results when partner capabilities are understood and valued, processes are tailored to leverage these capabilities, and these processes are tested and proven valuable to all partners. When breakdowns in information sharing occur, it erodes trust and is counterproductive to risk management. Information sharing is perhaps the most important factor in the protection and resilience of critical infrastructure. Information on threats to infrastructure and their likely impact underlies nearly every security decision made by owners and operators, including which assets to protect, how to make operations more resilient, how to plan for potential disasters, when to ramp up to higher levels of security, and how to respond in the immediate aftermath of a disaster. We looked at intelligence information flowing from the Federal Government to critical infrastructure owners and operators as well as risk information flowing from critical infrastructure owners and operators to the government. Our study reveals the complex ways information is gathered, analyzed, packaged, and shared among government and the owners and operators of critical infrastructures. In tackling this complex subject, we examined the different stages of the intelligence cycle, including requirements generation, information collection, analysis, and dissemination. To gather a variety of perspectives, we conducted extensive interviews with security directors, chief executives, subject matter experts, and government executives and managers. Recognizing that distinct sector characteristics shape information sharing needs, we conducted case studies of five sectors: Commercial Facilities, Healthcare and Public Health, Energy (Oil and Natural Gas), Banking and Finance, and Chemical. While we found some information sharing approaches to be effective, others were not. As a result, we adopted a “capability maturity approach,” which acknowledges that different Federal agencies have different abilities to share information effectively, and we sought to build on what is working.

Information Sharing Environment

Information Sharing Environment PDF Author: Eileen R. Larence
Publisher: DIANE Publishing
ISBN: 143790839X
Category : Political Science
Languages : en
Pages : 62

Get Book Here

Book Description
The attacks on 9/11 underscored the fed. government¿s need to facilitate terrorism-related info. sharing among gov¿t., private sector, and foreign stakeholders. In response, the Intelligence Reform and Terrorism Prevention Act mandated the creation of the Info. Sharing Environment (ISE), which is an approach for the sharing of terrorism-related info. A Program Manager oversees ISE development with assistance from the Info. Sharing Council, a forum for 16 info. sharing officials from fed. agencies and dep¿ts. This is a report on: (1) what actions have been taken to guide the design and implementation of the ISE; and (2) what efforts have been made to report on progress in implementing the ISE. Includes recommendations. Illustrations.

A Progress Report on Information Sharing for Homeland Security

A Progress Report on Information Sharing for Homeland Security PDF Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment
Publisher:
ISBN:
Category : Political Science
Languages : en
Pages : 76

Get Book Here

Book Description


Building the Information Sharing Environment

Building the Information Sharing Environment PDF Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 32

Get Book Here

Book Description


Federal Support for Homeland Security Information Sharing

Federal Support for Homeland Security Information Sharing PDF Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment
Publisher:
ISBN:
Category : Political Science
Languages : en
Pages : 64

Get Book Here

Book Description


A Report Card on Homeland Security Information Sharing

A Report Card on Homeland Security Information Sharing PDF Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment
Publisher:
ISBN:
Category : Business & Economics
Languages : en
Pages : 76

Get Book Here

Book Description


Progress report on information sharing for homeland security : hearing

Progress report on information sharing for homeland security : hearing PDF Author:
Publisher: DIANE Publishing
ISBN: 9781422323229
Category :
Languages : en
Pages : 150

Get Book Here

Book Description


Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative

Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative PDF Author: Mark A. Randol
Publisher: DIANE Publishing Inc.
ISBN: 1437925537
Category : Political Science
Languages : en
Pages : 26

Get Book Here

Book Description
The 9/11 Commission cited breakdowns in info. sharing and the failure to fuse pertinent intelligence as key factors in the failure to prevent the 9/11 attacks. Suspicious Activity Reports (SARs) contain info. about criminal activity that may also reveal terrorist pre-operational planning. The Nationwide SAR Initiative (NSI) is an effort to have most law enforcement org. participate in a standardized, integrated approach to gathering, documenting, processing, and analyzing terrorism-related SARs. This report describes the NSI, the rationale for the sharing of terrorism-related SARs, and how the NSI seeks to achieve this objective. It also examines the privacy and civil liberties concerns raised by the initiative.

Beyond the Storms

Beyond the Storms PDF Author: Dane S Egli
Publisher: Routledge
ISBN: 131747600X
Category : Political Science
Languages : en
Pages : 248

Get Book Here

Book Description
This book deals with both actual and potential terrorist attacks on the United States as well as natural disaster preparedness and management in the current era of global climate change. The topics of preparedness, critical infrastructure investments, and risk assessment are covered in detail. The author takes the reader beyond counterterrorism statistics, better first responder equipment, and a fixation on FEMA grant proposals to a holistic analysis and implementation of mitigation, response, and recovery efforts. The recent Oklahoma tornadoes and West Texas storage tank explosion show the unpredictability of disaster patterns, and the Boston Marathon bombings expose the difficulty in predicting and preventing attacks. Egli makes a compelling case for a culture of resilience by asserting a new focus on interagency collaboration, public-private partnerships, and collective action. Building upon the lessons of the 9/11 attacks, hurricane Katrina, and the Deepwater Horizon oil spill, the basic findings are supported by a creative mix of case studies, which include superstorm Sandy, cascading power outages, GPS and other system vulnerabilities, and Japan's Fukushima disaster with its sobering aftermath. This book will help a new generation of leaders understand the need for smart resilience.