Intelligence Sharing
   HOME

TheInfoList



OR:

Intelligence sharing is "the ability to exchange
intelligence Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. More generally, it can b ...
, information, data, or knowledge among Federal, state, local or private-sector entities as appropriate." Intelligence sharing also involves intergovernmental bilateral or multilateral agreements and through international organizations. Intelligence sharing is meant to facilitate the use of actionable intelligence to a broader range of decision-makers. Intelligence sharing is contrasted with
information sharing Information exchange or information sharing means that people or other entities pass information from one to another. This could be done electronically or through certain systems. These are terms that can either refer to bidirectional ''informa ...
, which may share the same methods of dissemination, but involves non-evaluated materials that have not been put through the rigors of the
intelligence cycle The Intelligence cycle describes how intelligence is ideally processed in civilian and military intelligence agencies, and law enforcement organizations. It is a closed path consisting of repeating nodes, which (if followed) will result in finish ...
.


History

Intelligence sharing, as a formal action performed by intelligence agencies and intergovernmental organizations, is a newer phenomena. Especially in the United States Intelligence Community, intelligence sharing was not formalized until after the
9/11 terrorist attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commercial ...
, when the need for intelligence sharing was the greatest. Before 9/11, many of the major US intelligence agencies, especially the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI) and the
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA) were protective of their information, and were unwilling to share information with the other agency, finding the other's methods to interfere with better procedure. The formalization of intelligence sharing began with the Patriot Act, the
Homeland Security Act The Homeland Security Act (HSA) of 2002, () was introduced in the aftermath of the September 11 attacks and subsequent mailings of anthrax spores. The HSA was cosponsored by 118 members of Congress. The act passed the U.S. Senate by a vote of ...
and the Intelligence Reform and Terrorism Prevention and Act of 2004, which changed the overall structure of the US intelligence community, and formed the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
The Department of Homeland Security (DHS) also became the umbrella organization for 15 intelligence agencies, between which the DHS would facilitate information sharing and collaboration. In addition, the formation of the Office of the Director of National Intelligence facilitated the sharing of intelligence between agencies and administrates several centers for improving intelligence work, including the
Information Sharing Environment The Information Sharing Environment (ISE) was established by the United States Intelligence Reform and Terrorism Prevention Act of 2004. Under Section 1016 of IRTPA, the Program Manager for the Information Sharing Environment (PM-ISE) was granted go ...
.


Types of Intelligence Sharing Networks

According to Joseph Pfeifer, there are 4 different type of networks which can be created to facilitate intelligence sharing:
hierarchical A hierarchy (from Greek: , from , 'president of sacred rites') is an arrangement of items (objects, names, values, categories, etc.) that are represented as being "above", "below", or "at the same level as" one another. Hierarchy is an important ...
, co-located liaisons, hub-and-spoke, and network fusion.Joseph Pfeifer
“Network Fusion: Information and Intelligence Sharing for a Networked World”
Homeland Security Affairs 8 (October 2012).
Hierarchical linear intelligence systems involve singular, point to point connections between agencies, such as between a federal and state level organization, a state organization to a local entity, or bilateral agreements between states. These sharing mechanisms tend to be slow, but allow for increased security, as there is a tightly controlled exchange of intelligence. Co-located liaisons networks involve the creation of cooperative, multi-agency or multi-governmental locations which house representatives and analysts from a diverse set of agencies. In these organizations, there are typically dedicated buildings and organizations to facilitate such intelligence sharing. The most common example of co-located liaisons networks are
fusion center In the United States, fusion centers are designed to promote information sharing at the federal level between agencies such as the Federal Bureau of Investigation, the U.S. Department of Homeland Security, the U.S. Department of Justice, and sta ...
s, which are formed from agencies or governments which have similar goals, and facilitate intelligence sharing in a common place. Hub-and-spoke network organization of intelligence sharing involves a common connection to intelligence and information, typically through secured networks to common servers and databases which all members can access. This method of intelligence sharing is employed by the Department of Homeland Security, which has
NIPRNet The Non-classified Internet Protocol (IP) Router Network (NIPRNet) is an IP network used to exchange unclassified information, including information subject to controls on distribution, among the private network's users. The NIPRNet also provide ...
and
SIPRNet The Secure Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information cla ...
databases which connects its member agencies.
Intellipedia Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC). It was established as a pilot project in late 2005 and formally announced in April 2006. Intellipedia consists of three wi ...
is also a form of hub-and-spoke intelligence sharing. Network fusion involves a combination of these networks which best facilitates the intelligence sharing for the particular organizations which utilize it. It is this multilevel integration of sharing techniques which many find to be lacking most between intelligence organizations.


Fields of Shared Intelligence

Intelligence sharing occurs in every field that intelligence analysis is produced. The main fields of intelligence analysis are
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
,
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term en ...
, and competitive. In each of these fields, intelligence is shared between agencies, bureaus, governments, or business partners in order to further their organizational goals. These goals can range from protecting people from violent threats, finding and apprehending criminals, or maintaining competitive advantage over other companies.


National Security

In the United States, National Security intelligence sharing occurs on many levels, ranging from field offices of IC organs to the
White House The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue NW in Washington, D.C., and has been the residence of every U.S. president since John Adams in 1800. ...
. The intelligence sharing became a formalized policy after
9/11 The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commercial ...
, when several Congressional acts reorganized the intelligence community and formalized intelligence sharing practices throughout. The Department of Homeland Security, Office of the Director of National Intelligence, and various fusion centers throughout the United States have been the vehicles for intelligence sharing. Their overall success in alleviating problems of intelligence sharing and effectiveness of operations has varied, but the need for improvements is acknowledged. In Europe, national security operations are carried out by various national agencies and the collective efforts of police forces through Europol and
Interpol The International Criminal Police Organization (ICPO; french: link=no, Organisation internationale de police criminelle), commonly known as Interpol ( , ), is an international organization that facilitates worldwide police cooperation and cri ...
. Europol intelligence sharing became an imperative after 9/11 in much the same way of the US. In November 2001, a European Council meeting created the Counter Terrorist Task Force, which facilitated increased counter-terror efforts in EU member states and encouraged intelligence sharing between member states to prevent an attack similar to 9/11. Subsequent terrorist attacks in London and Madrid in 2004 and 2005 "gave impetus to EU initiatives", and the creation of the Counterterrorism Coordinator increased collective efforts for national security aims for member states. Since 2001, legislation and informal meetings between the US Secretary of State, Director of Homeland Security, and other ministerial members of the US intelligence community have met with their counterparts in EU ministries to discuss shared objectives and provide information on transport security and impeding terrorist travel.


Law Enforcement

According to the US
National Criminal Intelligence Sharing Plan The National Criminal Intelligence Sharing Plan (NCISP) is an intelligence-sharing initiative that links the computer databases of local, state, regional, tribal law enforcement agencies with those of the U.S. federal government. See also * Automa ...
(NCISP), the law enforcement community went through similar changes as the national security community in order to perform to new expectations in the wake of the 9/11 attacks. The NCISP "was designed by state, local, tribal, and federal law enforcement partners to provide a path forward in improving the collection and analysis of information to create valuable and actionable intelligence products." Through the NCISP, there are 9 critical elements, 2 understandings of the systems which work in the intelligence sharing process, and 8 different types of participants. The 9 critical elements are leadership, partnerships, privacy, civil rights and civil liberties; policies, plans and procedures; intelligence process, training, security and safeguarding, technology and standards, and sustainability. The systems which are thought to be needed to achieve the Framework outlined are that the key to the success of information sharing systems is both use and interoperability and system interoperability is a complex problem. The main participants in intelligence sharing are criminal justice and law enforcement agencies below the federal level, federal law enforcement agencies, fusion centers, regional information sharing systems, High Intensity Drug Trafficking Areas (HIDTAs), crime analysis centers, law enforcement professional organizations, and private sector and non-law enforcement organizations.


Business

In the private intelligence field, businesses of various types, products and services will employ intelligence analysis to further their organizational goals,
competitive advantage In business, a competitive advantage is an attribute that allows an organization to outperform its competitors. A competitive advantage may include access to natural resources, such as high-grade ores or a low-cost power source, highly skilled ...
, and security. Typical businesses will keep much of their analytic products away from the public eye and especially from competitors. However, the realm of security, especially cyber security is a topic which many businesses have cooperated on in order to create a safer environment for their products, information, and customers. An example of this is the Retail Cyber Intelligence Sharing Center, which is a cooperative from over 30 (specifically) retail companies to share information and intelligence which pertains to the security of retail firms. Collectively, their work attempts to identify common threats and share best practices.“What Is R-CISC?”
accessed May 1, 2015.


References

{{reflist, 2


External links

* Archick , Kristin
US-EU Cooperation Against Terrorism
CRS Report (Congressional Research Service, December 1, 2014). * Boşilcǎ, Ruxandra Laura
Europol and Counter Terrorism Intelligence Sharing
(Europolity, n.d.). *Haas, Melinda; Yarhi-Milo, Keren (2021). " To Disclose or Deceive? Sharing Secret Information between Aligned States". ''International Security''. 45 (3): 122–161. Military intelligence collection