Future Intelligence Sharing In the Syrian War

Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system. 

In August 2013, a chemical weapons attack in Syria’s capital, Damascus, killed some 1,500 civilians and left two sides, the Syrian government and the rebels opposing President Bashar al-Assad’s regime, blaming each other for the destruction.

Within just nine days, that confusion ended when the White House released an intelligence assessment unequivocally linking the Syrian government to the attack, highlighting communications and other intercepts by US spy agencies used to make the assessment.

Two weeks later, the United Nations reached the same conclusion in its own report. How was the intelligence community able to reach such a rapid, accurate analysis of such an attack on foreign soil?

The answer, according to Beth Flanagan of the National Geospatial-Intelligence Agency, is integrated intelligence, or the increased ability for the 17 intelligence agencies to develop and share data and work on problems using the same platforms and environments.

Driven by the Intelligence Community Information Technology Enterprise, or ICITE (pronounced “eyesight”), the IC has been shoring up the same kinds of intelligence gaps that preceded the Sept. 11 terrorist attacks.

At its core, ICITE is all about moving IC agencies toward shared services, such as cloud computing and a common desktop environment.

Speaking recently at an event hosted by Defense One and the Intelligence and National Security Alliance, Flanagan, NGA’s ICITE mission lead, explained how ICITE allowed intelligence analysts from several IC agencies to rapidly “put the puzzle pieces together.”

“That’s the power of integrated intelligence,” Flanagan said. “The power of ICITE, of integrated intelligence, is reducing the time our analysts hunt and peck for data. It makes it easier for them to interrogate data and serve up conclusions to policy makers.”

Flanagan, a geospatial intelligence analyst by trade, said analysts usually spend “most of our time looking for the needle in the haystack.”

Through common services, platforms and collaborative tools ushers in by ICITE, analysts spend less time searching through data repositories and more time actually analyzing information, drawing up conclusions that senior policymakers and senior warfighters can use.

“We’re actually making the data and using the power of big data analytics, so the data will actually help find itself,” Flanagan said. “We’ve put in place the principles where it’s easier to serve up myriad of conclusions and make it less complex without taking humans out of the loop. (ICITE) makes it easier for them to interrogate data and serve up conclusions to policymakers.”

Flanagan’s example, she noted, dates back to 2013, just two years into the rollout of ICITE. She wouldn’t speculate how rapidly the IC could tackle an event similar to the Syrian chemical strikes today, but she said ICITE’s continued development bodes well for more effective intelligence integration in the future.

“The power of what we’re moving toward in the future, where data is an IC asset, we’re sharing data and using big data analytics, we’ll be able to reduce chaos and take advantage of things like the common desktop environment and common tools and platforms,” Flanagan said. “It’ll be easier for the workforce to do those things.”
DefenseOne : http://bit.ly/1s6IpJr

« One Massive Hack Last Year - Nobody Noticed!
Search It Yourself: Panama Papers Database Goes Public »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.