Future Intelligence Sharing In the Syrian War

Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system. 

In August 2013, a chemical weapons attack in Syria’s capital, Damascus, killed some 1,500 civilians and left two sides, the Syrian government and the rebels opposing President Bashar al-Assad’s regime, blaming each other for the destruction.

Within just nine days, that confusion ended when the White House released an intelligence assessment unequivocally linking the Syrian government to the attack, highlighting communications and other intercepts by US spy agencies used to make the assessment.

Two weeks later, the United Nations reached the same conclusion in its own report. How was the intelligence community able to reach such a rapid, accurate analysis of such an attack on foreign soil?

The answer, according to Beth Flanagan of the National Geospatial-Intelligence Agency, is integrated intelligence, or the increased ability for the 17 intelligence agencies to develop and share data and work on problems using the same platforms and environments.

Driven by the Intelligence Community Information Technology Enterprise, or ICITE (pronounced “eyesight”), the IC has been shoring up the same kinds of intelligence gaps that preceded the Sept. 11 terrorist attacks.

At its core, ICITE is all about moving IC agencies toward shared services, such as cloud computing and a common desktop environment.

Speaking recently at an event hosted by Defense One and the Intelligence and National Security Alliance, Flanagan, NGA’s ICITE mission lead, explained how ICITE allowed intelligence analysts from several IC agencies to rapidly “put the puzzle pieces together.”

“That’s the power of integrated intelligence,” Flanagan said. “The power of ICITE, of integrated intelligence, is reducing the time our analysts hunt and peck for data. It makes it easier for them to interrogate data and serve up conclusions to policy makers.”

Flanagan, a geospatial intelligence analyst by trade, said analysts usually spend “most of our time looking for the needle in the haystack.”

Through common services, platforms and collaborative tools ushers in by ICITE, analysts spend less time searching through data repositories and more time actually analyzing information, drawing up conclusions that senior policymakers and senior warfighters can use.

“We’re actually making the data and using the power of big data analytics, so the data will actually help find itself,” Flanagan said. “We’ve put in place the principles where it’s easier to serve up myriad of conclusions and make it less complex without taking humans out of the loop. (ICITE) makes it easier for them to interrogate data and serve up conclusions to policymakers.”

Flanagan’s example, she noted, dates back to 2013, just two years into the rollout of ICITE. She wouldn’t speculate how rapidly the IC could tackle an event similar to the Syrian chemical strikes today, but she said ICITE’s continued development bodes well for more effective intelligence integration in the future.

“The power of what we’re moving toward in the future, where data is an IC asset, we’re sharing data and using big data analytics, we’ll be able to reduce chaos and take advantage of things like the common desktop environment and common tools and platforms,” Flanagan said. “It’ll be easier for the workforce to do those things.”
DefenseOne : http://bit.ly/1s6IpJr

« One Massive Hack Last Year - Nobody Noticed!
Search It Yourself: Panama Papers Database Goes Public »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.

Axelerated Solutions

Axelerated Solutions

Axelerated Solutions offer a comprehensive range of technology services tailored to meet our clients' diverse needs. Our focus is on delivering innovative and secure solutions.