Future Intelligence Sharing In the Syrian War

Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system. 

In August 2013, a chemical weapons attack in Syria’s capital, Damascus, killed some 1,500 civilians and left two sides, the Syrian government and the rebels opposing President Bashar al-Assad’s regime, blaming each other for the destruction.

Within just nine days, that confusion ended when the White House released an intelligence assessment unequivocally linking the Syrian government to the attack, highlighting communications and other intercepts by US spy agencies used to make the assessment.

Two weeks later, the United Nations reached the same conclusion in its own report. How was the intelligence community able to reach such a rapid, accurate analysis of such an attack on foreign soil?

The answer, according to Beth Flanagan of the National Geospatial-Intelligence Agency, is integrated intelligence, or the increased ability for the 17 intelligence agencies to develop and share data and work on problems using the same platforms and environments.

Driven by the Intelligence Community Information Technology Enterprise, or ICITE (pronounced “eyesight”), the IC has been shoring up the same kinds of intelligence gaps that preceded the Sept. 11 terrorist attacks.

At its core, ICITE is all about moving IC agencies toward shared services, such as cloud computing and a common desktop environment.

Speaking recently at an event hosted by Defense One and the Intelligence and National Security Alliance, Flanagan, NGA’s ICITE mission lead, explained how ICITE allowed intelligence analysts from several IC agencies to rapidly “put the puzzle pieces together.”

“That’s the power of integrated intelligence,” Flanagan said. “The power of ICITE, of integrated intelligence, is reducing the time our analysts hunt and peck for data. It makes it easier for them to interrogate data and serve up conclusions to policy makers.”

Flanagan, a geospatial intelligence analyst by trade, said analysts usually spend “most of our time looking for the needle in the haystack.”

Through common services, platforms and collaborative tools ushers in by ICITE, analysts spend less time searching through data repositories and more time actually analyzing information, drawing up conclusions that senior policymakers and senior warfighters can use.

“We’re actually making the data and using the power of big data analytics, so the data will actually help find itself,” Flanagan said. “We’ve put in place the principles where it’s easier to serve up myriad of conclusions and make it less complex without taking humans out of the loop. (ICITE) makes it easier for them to interrogate data and serve up conclusions to policymakers.”

Flanagan’s example, she noted, dates back to 2013, just two years into the rollout of ICITE. She wouldn’t speculate how rapidly the IC could tackle an event similar to the Syrian chemical strikes today, but she said ICITE’s continued development bodes well for more effective intelligence integration in the future.

“The power of what we’re moving toward in the future, where data is an IC asset, we’re sharing data and using big data analytics, we’ll be able to reduce chaos and take advantage of things like the common desktop environment and common tools and platforms,” Flanagan said. “It’ll be easier for the workforce to do those things.”
DefenseOne : http://bit.ly/1s6IpJr

« One Massive Hack Last Year - Nobody Noticed!
Search It Yourself: Panama Papers Database Goes Public »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

ITrust

ITrust

ITrust develops breakthrough products in Cyber/Artificial Intelligence, offering its products in Europe, America and Africa through its partner network (VAR, MSSP, OEM).

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.