Future Intelligence Sharing In the Syrian War

Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system. 

In August 2013, a chemical weapons attack in Syria’s capital, Damascus, killed some 1,500 civilians and left two sides, the Syrian government and the rebels opposing President Bashar al-Assad’s regime, blaming each other for the destruction.

Within just nine days, that confusion ended when the White House released an intelligence assessment unequivocally linking the Syrian government to the attack, highlighting communications and other intercepts by US spy agencies used to make the assessment.

Two weeks later, the United Nations reached the same conclusion in its own report. How was the intelligence community able to reach such a rapid, accurate analysis of such an attack on foreign soil?

The answer, according to Beth Flanagan of the National Geospatial-Intelligence Agency, is integrated intelligence, or the increased ability for the 17 intelligence agencies to develop and share data and work on problems using the same platforms and environments.

Driven by the Intelligence Community Information Technology Enterprise, or ICITE (pronounced “eyesight”), the IC has been shoring up the same kinds of intelligence gaps that preceded the Sept. 11 terrorist attacks.

At its core, ICITE is all about moving IC agencies toward shared services, such as cloud computing and a common desktop environment.

Speaking recently at an event hosted by Defense One and the Intelligence and National Security Alliance, Flanagan, NGA’s ICITE mission lead, explained how ICITE allowed intelligence analysts from several IC agencies to rapidly “put the puzzle pieces together.”

“That’s the power of integrated intelligence,” Flanagan said. “The power of ICITE, of integrated intelligence, is reducing the time our analysts hunt and peck for data. It makes it easier for them to interrogate data and serve up conclusions to policy makers.”

Flanagan, a geospatial intelligence analyst by trade, said analysts usually spend “most of our time looking for the needle in the haystack.”

Through common services, platforms and collaborative tools ushers in by ICITE, analysts spend less time searching through data repositories and more time actually analyzing information, drawing up conclusions that senior policymakers and senior warfighters can use.

“We’re actually making the data and using the power of big data analytics, so the data will actually help find itself,” Flanagan said. “We’ve put in place the principles where it’s easier to serve up myriad of conclusions and make it less complex without taking humans out of the loop. (ICITE) makes it easier for them to interrogate data and serve up conclusions to policymakers.”

Flanagan’s example, she noted, dates back to 2013, just two years into the rollout of ICITE. She wouldn’t speculate how rapidly the IC could tackle an event similar to the Syrian chemical strikes today, but she said ICITE’s continued development bodes well for more effective intelligence integration in the future.

“The power of what we’re moving toward in the future, where data is an IC asset, we’re sharing data and using big data analytics, we’ll be able to reduce chaos and take advantage of things like the common desktop environment and common tools and platforms,” Flanagan said. “It’ll be easier for the workforce to do those things.”
DefenseOne : http://bit.ly/1s6IpJr

« One Massive Hack Last Year - Nobody Noticed!
Search It Yourself: Panama Papers Database Goes Public »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Caulis

Caulis

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

QPoint Technologies

QPoint Technologies

QPoint provides solutions and consulting in areas including software engineering, testing, cybersecurity, ICT, web, mobile, project management, and complex integration processes.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

Intraframe US

Intraframe US

Intraframe US is a cybersecurity company in Memphis, specializing in Digital Forensics Incident Response and Managed IT services. We provide SMBs with a 24/7 SOC for proactive Cyber Threat Management.

Arctera

Arctera

Arctera simplifies data management to keep you secure. Our company operates as three units - Data Compliance, Data Resilience, and Data Protection.