Intelligence sharing
The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. (June 2015) |
Intelligence sharing is "the ability to exchange intelligence, information, data, or knowledge among Federal, state, local or private-sector entities as appropriate."[1] Intelligence sharing also involves intergovernmental bilateral or multilateral agreements and through international organizations. Intelligence sharing is meant to facilitate the use of actionable intelligence to a broader range of decision-makers.
Intelligence sharing is contrasted with
History
Intelligence sharing, as a formal action performed by intelligence agencies and intergovernmental organizations, is a newer phenomena. Especially in the
In addition, the formation of the
Types of Intelligence Sharing Networks
According to Joseph Pfeifer, there are 4 different type of networks which can be created to facilitate intelligence sharing:
Hierarchical linear intelligence systems involve singular, point to point connections between agencies, such as between a federal and state level organization, a state organization to a local entity, or bilateral agreements between states.[6] These sharing mechanisms tend to be slow, but allow for increased security, as there is a tightly controlled exchange of intelligence.
Co-located liaisons networks involve the creation of cooperative, multi-agency or multi-governmental locations which house representatives and analysts from a diverse set of agencies. In these organizations, there are typically dedicated buildings and organizations to facilitate such intelligence sharing. The most common example of co-located liaisons networks are fusion centers, which are formed from agencies or governments which have similar goals, and facilitate intelligence sharing in a common place.
Hub-and-spoke network organization of intelligence sharing involves a common connection to intelligence and information, typically through secured networks to common servers and databases which all members can access. This method of intelligence sharing is employed by the Department of Homeland Security, which has NIPRNet and SIPRNet databases which connects its member agencies. Intellipedia is also a form of hub-and-spoke intelligence sharing.[7]
Network fusion involves a combination of these networks which best facilitates the intelligence sharing for the particular organizations which utilize it. It is this multilevel integration of sharing techniques which many find to be lacking most between intelligence organizations.[6]
Intelligence sharing occurs in every field that intelligence analysis is produced. The main fields of intelligence analysis are national security, law enforcement, and competitive. In each of these fields, intelligence is shared between agencies, bureaus, governments, or business partners in order to further their organizational goals. These goals can range from protecting people from violent threats, finding and apprehending criminals, or maintaining competitive advantage over other companies.
National Security
In the
In Europe, national security operations are carried out by various national agencies and the collective efforts of police forces through Europol and Interpol.[9] Europol intelligence sharing became an imperative after 9/11 in much the same way of the US. In November 2001, a European Council meeting created the Counter Terrorist Task Force, which facilitated increased counter-terror efforts in EU member states and encouraged intelligence sharing between member states to prevent an attack similar to 9/11.[10] Subsequent terrorist attacks in London and Madrid in 2004 and 2005 "gave impetus to EU initiatives", and the creation of the Counterterrorism Coordinator increased collective efforts for national security aims for member states.[11]
Since 2001, legislation and informal meetings between the US Secretary of State, Director of Homeland Security, and other ministerial members of the US intelligence community have met with their counterparts in EU ministries to discuss shared objectives and provide information on transport security and impeding terrorist travel.[12]
Law Enforcement
According to the US National Criminal Intelligence Sharing Plan (NCISP), the law enforcement community went through similar changes as the national security community in order to perform to new expectations in the wake of the 9/11 attacks. The NCISP "was designed by state, local, tribal, and federal law enforcement partners to provide a path forward in improving the collection and analysis of information to create valuable and actionable intelligence products."[13]
Through the NCISP, there are 9 critical elements, 2 understandings of the systems which work in the intelligence sharing process, and 8 different types of participants. The 9 critical elements are leadership, partnerships, privacy, civil rights and civil liberties; policies, plans and procedures; intelligence process, training, security and safeguarding, technology and standards, and sustainability. The systems which are thought to be needed to achieve the Framework outlined are that the key to the success of information sharing systems is both use and interoperability and system interoperability is a complex problem. The main participants in intelligence sharing are criminal justice and law enforcement agencies below the federal level, federal law enforcement agencies, fusion centers, regional information sharing systems, High Intensity Drug Trafficking Areas (HIDTAs), crime analysis centers, law enforcement professional organizations, and private sector and non-law enforcement organizations.[14]
Business
In the private intelligence field, businesses of various types, products and services will employ intelligence analysis to further their organizational goals, competitive advantage, and security.
Typical businesses will keep much of their analytic products away from the public eye and especially from competitors. However, the realm of security, especially cyber security is a topic which many businesses have cooperated on in order to create a safer environment for their products, information, and customers. An example of this is the Retail Cyber Intelligence Sharing Center, which is a cooperative from over 30 (specifically) retail companies to share information and intelligence which pertains to the security of retail firms. Collectively, their work attempts to identify common threats and share best practices.[15]
References
- ^ National Preparedness Goal (US Department of Homeland Security, September 2011).
- ^ A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE) (Information Sharing Environment, n.d.).
- ^ Mark Riebling, Wedge: From Pearl Harbor to 9/11: How the Secret War between the FBI and CIA Has Endangered National Security (Simon and Schuster, 2010).
- ^ 108th Congress (December 17, 2004). "Intelligence Reform and Terrorism Prevention Act of 2004" (PDF). U.S. Bill S. 2845.
- ^ “Information Sharing,” Department of Homeland Security, accessed April 29, 2015.
- ^ a b c Joseph Pfeifer, “Network Fusion: Information and Intelligence Sharing for a Networked World”, Homeland Security Affairs 8 (October 2012).
- ^ “Intellipedia Celebrates Third Anniversary with a Successful Challenge”, Central Intelligence Agency, accessed April 29, 2015.
- ^ Alfred Berkeley et al., Intelligence Information Sharing: Final Report and Recommendations (National Infrastructure Advisory Council, January 2012).
- ^ Boşilcǎ, 2014, p. 7.
- ^ Boşilcǎ, 2014, p. 10.
- ^ Archick, 2014.
- ^ Archick, 2014, p. 2.
- ^ “National Criminal Intelligence Sharing Plan” (Bureau of Justice Assistance: US Department of Justice, October 2013), pg V.
- ^ “National Criminal Intelligence Sharing Plan”, (Bureau of Justice Assistance: US Department of Justice, October 2013).
- ^ “What Is R-CISC?”, accessed May 1, 2015.
External links
- Archick , Kristin. US-EU Cooperation Against Terrorism, CRS Report (Congressional Research Service, December 1, 2014).
- Boşilcǎ, Ruxandra Laura. Europol and Counter Terrorism Intelligence Sharing, (Europolity, n.d.).
- Haas, Melinda; Yarhi-Milo, Keren (2021). "To Disclose or Deceive? Sharing Secret Information between Aligned States". International Security. 45 (3): 122–161.