Future Intelligence Sharing In the Syrian War

Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system. 

In August 2013, a chemical weapons attack in Syria’s capital, Damascus, killed some 1,500 civilians and left two sides, the Syrian government and the rebels opposing President Bashar al-Assad’s regime, blaming each other for the destruction.

Within just nine days, that confusion ended when the White House released an intelligence assessment unequivocally linking the Syrian government to the attack, highlighting communications and other intercepts by US spy agencies used to make the assessment.

Two weeks later, the United Nations reached the same conclusion in its own report. How was the intelligence community able to reach such a rapid, accurate analysis of such an attack on foreign soil?

The answer, according to Beth Flanagan of the National Geospatial-Intelligence Agency, is integrated intelligence, or the increased ability for the 17 intelligence agencies to develop and share data and work on problems using the same platforms and environments.

Driven by the Intelligence Community Information Technology Enterprise, or ICITE (pronounced “eyesight”), the IC has been shoring up the same kinds of intelligence gaps that preceded the Sept. 11 terrorist attacks.

At its core, ICITE is all about moving IC agencies toward shared services, such as cloud computing and a common desktop environment.

Speaking recently at an event hosted by Defense One and the Intelligence and National Security Alliance, Flanagan, NGA’s ICITE mission lead, explained how ICITE allowed intelligence analysts from several IC agencies to rapidly “put the puzzle pieces together.”

“That’s the power of integrated intelligence,” Flanagan said. “The power of ICITE, of integrated intelligence, is reducing the time our analysts hunt and peck for data. It makes it easier for them to interrogate data and serve up conclusions to policy makers.”

Flanagan, a geospatial intelligence analyst by trade, said analysts usually spend “most of our time looking for the needle in the haystack.”

Through common services, platforms and collaborative tools ushers in by ICITE, analysts spend less time searching through data repositories and more time actually analyzing information, drawing up conclusions that senior policymakers and senior warfighters can use.

“We’re actually making the data and using the power of big data analytics, so the data will actually help find itself,” Flanagan said. “We’ve put in place the principles where it’s easier to serve up myriad of conclusions and make it less complex without taking humans out of the loop. (ICITE) makes it easier for them to interrogate data and serve up conclusions to policymakers.”

Flanagan’s example, she noted, dates back to 2013, just two years into the rollout of ICITE. She wouldn’t speculate how rapidly the IC could tackle an event similar to the Syrian chemical strikes today, but she said ICITE’s continued development bodes well for more effective intelligence integration in the future.

“The power of what we’re moving toward in the future, where data is an IC asset, we’re sharing data and using big data analytics, we’ll be able to reduce chaos and take advantage of things like the common desktop environment and common tools and platforms,” Flanagan said. “It’ll be easier for the workforce to do those things.”
DefenseOne : http://bit.ly/1s6IpJr

« One Massive Hack Last Year - Nobody Noticed!
Search It Yourself: Panama Papers Database Goes Public »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Brightside AI

Brightside AI

Brightside AI is a Swiss cybersecurity SaaS that helps teams combat AI-enabled phishing threats. Protect your team today.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.