The Information Sharing Environment (ISE) was established by the United States Intelligence Reform and Terrorism Prevention Act of 2004. [1] Under Section 1016 of IRTPA, the Program Manager for the Information Sharing Environment (PM-ISE) was granted government wide authority to plan for, oversee the implementation of, and manage the ISE.
The Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) is a 235-page Act of Congress, signed by President George W. Bush, that broadly affects United States federal terrorism laws. The act comprises several separate titles with varying subject issues. It was enacted in response to the terror attacks of September 11, 2001.
The ISE provides analysts, operators, and investigators with information needed to enhance national security. These analysts, operators, and investigators come from a variety of communities - law enforcement, public safety, homeland security, intelligence, defense, and foreign affairs – and may work for federal, state, local, tribal, or territorial governments. [2] They also have mission needs to collaborate and share information with each other and with private sector partners and our foreign allies. Federal agencies and state, local, tribal, and private sector partners — the ISE Mission Partners — deliver, and operate, the ISE and are accountable for sharing to enable end-to-end mission processes that support counterterrorism. [3]
The PM-ISE works with ISE Mission Partners to improve the management, discovery, fusing, sharing, delivery of, and collaboration around terrorism-related information. [3] The primary focus is any mission process, anywhere in the United States, that is intended or is likely to have a material impact on detecting, preventing, disrupting, responding to, or mitigating terrorist activity. Examples include: terrorism watchlisting, person and cargo screening, suspicious activity reporting, and alerts, warnings and notifications. The PM-ISE facilitates the development of the ISE by bringing together mission partners and aligning business processes, standards and architecture, security and access controls, privacy protections, and best practices. [4]
The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 removed barriers that once restricted the sharing of information between the law enforcement and intelligence communities. [5]
The USA PATRIOT Act is an Act of the U.S. Congress that was signed into law by President George W. Bush on October 26, 2001. The title of the Act is a contrived three letter initialism (USA) preceding a seven letter acronym (PATRIOT), which in combination stand for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001. The acronym was created by a 23 year old Congressional staffer, Chris Kyke. The USA PATRIOT Act is an Act of Congress signed into law by United States President George W. Bush on October 26, 2001. With its ten-letter abbreviation expanded, the Act's full title is "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001".
The Homeland Security Act of 2002 established the Department of Homeland Security (DHS) in part to improve the sharing of information among Federal, State, and local government agencies and the private sector, in order to enhance the Nation's ability to detect, identify, understand, and assess terrorist threats to and vulnerabilities of the homeland, to better protect our Nation's critical infrastructure, integrate our emergency response networks, and link State and Federal Governments. On July 29, 2003, the U.S. President issued Executive Order 13311, addressing key information sharing provisions in the Homeland Security Act. [6]
The Homeland Security Act (HSA) of 2002, was introduced in the aftermath of the September 11 attacks and subsequent mailings of anthrax spores. The HSA was cosponsored by 118 members of Congress. The act passed the U.S. Senate by one vote, with the pivotal vote in a tied Senate being cast by Independent Dean Barkley. It was signed into law by President George W. Bush in November 2002.
The Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) reorganized the Intelligence Community and established the position of Director of National Intelligence to serve as the U.S. President's chief intelligence advisor and the head of the Intelligence Community, and to ensure closer coordination and integration of the 16 agencies that make up the Intelligence Community. IRTPA also established the National Counterterrorism Center (NCTC) to serve as a multiagency center analyzing and integrating all intelligence pertaining to terrorism, including threats to U.S. interests at home and abroad. [7]
The United States Intelligence Community (IC) is a federation of 16 separate United States government intelligence agencies and a 17th administrative office, that work separately and together to conduct intelligence activities to support the foreign policy and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is overseen by the Office of the Director of National Intelligence (ODNI) making up the seventeen-member Intelligence Community, which itself is headed by the Director of National Intelligence (DNI), who reports to the President of the United States.
The Director of National Intelligence (DNI) is the United States government Cabinet-level official—subject to the authority, direction, and control of the President of the United States—required by the Intelligence Reform and Terrorism Prevention Act of 2004 to:
The National Counterterrorism Center (NCTC) is a United States government organization responsible for national and international counterterrorism efforts. It is based in Liberty Crossing, a modern complex near Tysons Corner in McLean, Virginia. NCTC advises the United States on terrorism.
Section 1016 of IRTPA embraced the key principles of Executive Order 13356 and directed the establishment of the Information Sharing Environment. The U.S. President was charged to create the ISE, designate its organization and management structure, and determine and enforce the policies and rules to govern the ISE's content and usage. The law further required the ISE be "a decentralized, distributed, and coordinated environment" that "to the greatest extent practicable ... connects existing systems ... builds upon existing systems capabilities currently in use across the Government ... facilitates the sharing of information at and across all levels of security ... and incorporates protections for individuals' privacy and civil liberties." [4]
IRTPA required the U.S. President designate a Program Manager for the ISE. The role of the Program Manager is to manage the ISE, oversee its implementation, assist in the development of ISE standards and practices, and monitor and assess its implementation by federal departments and agencies. IRTPA also established an Information Sharing Council to advise the U.S. President and the Program Manager on the development of ISE policies, procedures, guidelines, and standards, and to ensure proper coordination among federal departments and agencies participating in the ISE. Under the Obama Administration, the Information Sharing Council has been integrated into the White House policy process through the Information Sharing and Access Interagency Policy Committee (IPC), so that the important work of the ISC will move forward under the auspices of the Executive Office of the President. [1]
On August 27, 2004, in response to the Recommendations of the 9/11 Commission, the U.S. President issued Executive Order 13356, Strengthening the Sharing of Terrorism Information to Protect Americans. In it the U.S. President directed agencies to give the "highest priority" to the prevention of terrorism and the "interchange of terrorism information [both] among agencies" and "between agencies and appropriate authorities of States and local governments." The U.S. President further directed that this improved information sharing be accomplished in ways that "protect the freedom, information privacy, and other legal rights of Americans." [4]
On October 25, 2005, the U.S. President issued Executive Order 13388, Further Strengthening the Sharing of Terrorism Information to Protect Americans, superseding Executive Order 13356, to facilitate the work of the Program Manager, expedite the establishment of the ISE, and restructure the Information Sharing Council. [6]
On December 16, 2005, in accordance with section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004, the U.S. President issued a Memorandum to Heads of Executive Departments and Agencies prescribing the guidelines and requirements in support of the creation and implementation of the ISE. The Memorandum contained two requirements and five guidelines which prioritize efforts the U.S. President believes are most critical to the development of the ISE and assigned Cabinet officials responsibility for resolving some of the more complicated issues associated with information sharing. [7] [8]
The U.S. President directed that the ISE be established by building upon "existing Federal Government policies, standards, procedures, programs, systems, and architectures (collectively "resources") used for the sharing and integration of and access to terrorism-related information, and ... leverage those resources to the maximum extent practicable, with the objective of establishing a decentralized, comprehensive, and coordinated environment for the sharing and integration of such information." The U.S. President also directed the heads of executive departments and agencies to "actively work to create a culture of information sharing within their respective departments or agencies by assigning personnel and dedicating resources to terrorism-related information sharing, by reducing disincentives to such sharing, and by holding their senior managers accountable for improved and increased sharing of such information.". [6]
Later, in August 2007, the Implementing Recommendations of the 9/11 Commission Act of 2007 included amendments to section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 and to the Homeland Security Act of 2002. The new law expanded the scope of the ISE to explicitly include homeland security information and weapons of mass destruction information. It also endorses and formalizes many of the recommendations developed in response to the President's information sharing guidelines, such as the creation of the Interagency Threat Assessment and Coordination Group, and the development of a national network of State and major urban area fusion centers. [6]
The United States Department of Homeland Security (DHS) is a cabinet department of the U.S. federal government with responsibilities in public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management. It was created in response to the September 11 attacks and is the youngest U.S. cabinet department.
The Freedom of Information Act (FOIA), 5 U.S.C. § 552, is a federal freedom of information law that requires the full or partial disclosure of previously unreleased information and documents controlled by the United States government upon request. The Act defines agency records subject to disclosure, outlines mandatory disclosure procedures, and defines nine exemptions to the statute. President Lyndon B. Johnson, despite his misgivings, signed the Freedom of Information Act into law on July 4, 1966, and it went into effect the following year.
President George W. Bush signed Executive Order 13388 on October 25, 2005. Its title is "Further Strengthening the Sharing of Terrorism Information To Protect Americans."
A cyber fusion is an intelligence gathering, analysis and dissemination state or major urban area center, which is owned by state, local, and territorial law enforcement and Department of Homeland Security entities, many of which were jointly created between 2003 and 2007 under the U.S. Department of Homeland Security (DHS) and the Office of Justice Programs in the U.S. Department of Justice. The DHS Office of Intelligence and Analysis (I&A) and Federal Emergency Management Agency (FEMA) provide Fusion Centers with resources, training, and other coordinated services. The goal of such centers are to strengthen National anti-terrorism networks within the U.S. Federal government.
The Privacy and Civil Liberties Oversight Board (PCLOB) is an independent agency within the executive branch of the United States government, established by Congress in 2004 to advise the President and other senior executive branch officials to ensure that concerns with respect to privacy and civil liberties in the United States are appropriately considered in the development and implementation of all laws, regulations, and executive branch policies related to terrorism.
The United States government's Information Sharing and Customer Outreach office or ISCO was one of five directorates within the office of the Chief Information Officer (CIO) under the Office of the Director of National Intelligence (ODNI). ISCO changed its name and function to Information Technology Policy, Plans, and Requirements (ITPR) in July 2007. Established by at least February 2006, ISCO is led by the Deputy Associate Director of National Intelligence for Information Sharing and Customer Outreach, which is currently Mr. Richard A. Russell. ISCO's information sharing and customer outreach responsibilities extend beyond the United States Intelligence Community and cross the entire U.S. government.
Information exchange or information sharing are informal terms that can either refer to bidirectional information transfer in telecommunications and computer science or communication seen from a system-theoretic or information-theoretic point of view. As "information" in this context invariably refers to (electronic) data that encodes and represents the information at hand, a broader treatment can be found under data exchange.
The Joint Regional Information Exchange System (JRIES) began in December 2002 as an all-source intelligence / information sharing system, designed initially as a grassroots pilot system to connect the California Anti-Terrorism Information Center, the New York Police Department, and the Defense Intelligence Agency (DIA).
Einstein was originally an intrusion detection system that monitors the network gateways of government departments and agencies in the United States for unauthorized traffic. The software was developed by the United States Computer Emergency Readiness Team (US-CERT), which is the operational arm of the National Cyber Security Division (NCSD) of the United States Department of Homeland Security (DHS). The program was originally developed to provide "situational awareness" for the civilian agencies. While the first version examined network traffic and subsequent versions examined content, the current version of Einstein is significantly more advanced.
Executive Order 13356 is a United States Presidential Executive Order signed on August 27, 2004, by President George W. Bush. Its goal was "Strengthening the Sharing of Terrorism Information To Protect Americans". It was supplemented and partially superseded Executive Order 13388.
The National Maritime Intelligence-Integration Office(NMIO) is a United States Navy entity located in the National Maritime Intelligence Center (NMIC) Facility in Suitland in Prince George's County, Maryland, southeast of Washington, DC. It is a part of the Suitland Federal Center.
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a program of the United States Government used to collect and share reports of suspicious activity by people in the United States. The Nationwide SAR Initiative (NSI) builds on what law enforcement and other agencies have been doing for years — gathering information regarding behaviors and incidents associated with criminal activity — but without the customary restrictions on collecting data on individuals in the absence of reasonable suspicion or probable cause. The program has established a standardized process whereby SARs can be shared among agencies to help detect and prevent terrorism-related criminal activity. This process is in direct response to the mandate to establish a "unified process for reporting, tracking, and accessing [SARs]" in a manner that rigorously protects the privacy and civil liberties of Americans, as called for in the 2007 National Strategy for Information Sharing (NSIS), which in turn was authorized by the Intelligence Reform and Terrorism Prevention Act of 2004. Reports of suspicious behavior noticed by local law enforcement or by private citizens are forwarded to state and major urban area fusion centers as well as DHS and the FBI for analysis. Sometimes this information is combined with other information to evaluate the suspicious activity in greater context. The program is primarily under the direction of the US Department of Justice.
Stephen B. Slick is a former Central Intelligence Agency (CIA) operations officer and United States National Security Council official. He is the current director of the Intelligence Studies Project at the University of Texas at Austin, where he is also a Clinical Professor at the Lyndon B. Johnson School of Public Affairs.
The Cyber Threat Intelligence Integration Center (CTIIC) is a new United States federal government agency that will be a fusion center between existing agencies and the private sector for real-time use against cyber attacks. CTIIC was created due to blocked efforts in Congress that were stymied over liability and privacy concerns of citizens.
Intelligence sharing is "the ability to exchange intelligence, information, data, or knowledge among Federal, state, local or private-sector entities as appropriate." Intelligence sharing also involves intergovernmental bilateral or multilateral agreements and through international organizations. Intelligence sharing is meant to facilitate the use of actionable intelligence to a broader range of decision-makers.