ISE in the News

By Wyatt Kash

As organizers of the Boston Marathon prepared for last April's race, federal, state and local emergency and law enforcement officials were busy putting another set of preparations in place.

From Information Week, 09/12/2013

When the Boston Marathon bombers were identified, tracked down and caught within days, a lot of credit went to interagency information sharing. That incident is one of the accomplishments outlined in the 2013 report to Congress from the Information Sharing Environment. But the report found, agencies still have some work to do when it comes to network security. Program Manager Kshmendra Paul described the highlights of the ISE report.

From Federal News Radio, 09/09/2013

By Alexander W. Joel

Many Americans probably don't know that there is a senior official whose job by law is to help ensure that civil liberties and privacy protections are built into intelligence programs. I am that official - the "Civil Liberties Protection Officer." I engage with the director of national intelligence and other intelligence officials to oversee and guide intelligence activities.

Continue Reading McClatchy Op-Ed

From McClatchy-Tribune News Service, 08/15/2013

The California State Threat Assessment System (STAS) - six fusion centers created in the aftermath of the information sharing failures leading to the September 11, 2001 terrorist attacks - organized and positioned to have the closest possible relationship with the city and county public safety personnel, local businesses, and most importantly California's citizens, was praised in a report, Majority Staff Report on the National Network of Fusion Centers, by the United States House of Representatives Committee on Homeland Security, released last month.

From Imperial Valley News, 08/08/2013

Information superiority is critical to our nation's future, particularly in the realms of defense and homeland security. But beyond access to more types of information than one's adversary, that superiority also requires the ability to process that information faster and more efficiently.

America's information capital is vast. Yet technological obstacles and territorial mind-sets at agencies thwart efforts to bring to bear the full power of all the information residing in federal databases.

From Federal Computer Week, 07/15/2013
From Government CIO Magazine, 07/02/2013

When tragedy struck the Boston Marathon, law enforcement and national security officials sifted through untold amounts of information and identified suspects within three days. Data came from literally everywhere: video from business-owned cameras; individual bystanders’ cellphone pictures, information from the media and large amounts of material collected by investigators themselves.

From Politico, Opinion, 05/20/2013

Two Pentagon memos make official Defense Department adoption of the National Information Exchange Model as the basis for defense data exchange. A March 28 memo (.pdf) from DoD Chief Information Officer Teri Takai says that as of that date, her office will no longer support further development of UCore or its C2 Core implementation "as unique DoD exchange models." The memo does say that applicable UCore and C2 Core data components will carry over to the Military Operations Domain NIEM extension to be established as part of the Defense Department's adoption of NIEM.

From FierceGovernmentIT, 05/06/2013

Boston’s Regional Intelligence Center is poised to aid investigators as they search for suspects in yesterday’s bombing.

The center is one of America’s 77 intelligence-sharing facilities, known as fusion centers, that allow investigators to pool data from local, state and federal sources. The state-run centers were funded by the Department of Homeland Security in the years after 9/11 to address the lack of information sharing among agencies, an issue cited as a factor in the government’s failure to prevent the 2001 attacks.

From The Wall Street Journal, 04/17/2013

A new initiative to share information on cyber threats between businesses and government is to be launched. It will include experts from government communications body GCHQ, MI5, police and business and aims to better co-ordinate responses to the threats. There will be a secure web-portal to allow access to shared information in real time, like a "secure Facebook". UK networks are attacked by other states, criminals and companies seeking secrets, costing billions of pounds.

From BBC News, 04/02/2013