President Barack Obama meets with Director of National Intelligence James Clapper, right, in the Oval Office, Sept. 9, 2010.

President Barack Obama meets with Director of National Intelligence James Clapper, right, in the Oval Office, Sept. 9, 2010. Official White House Photo by Pete Souza

Obama Pushes for Greater Intel Sharing in New Strategy

Risky or not, the new national security strategy pushes for greater information sharing between intelligence agencies, at home and abroad.

This story has been updated.

In the new National Security Strategy unveiled Friday, President Barack Obama said better information sharing across intelligence agencies is one of his key requirements to protecting the country from everything from ISIL to infrastructure-crippling cyber attacks.

The administration is working to “better integrate” the intelligence community, or IC, across agencies and foreign intelligence services.  

One example of that integration is the Intelligence Community, Information Technology Enterprise, or IC ITE, first unveiled by National Intelligence Director James Clapper in 2012. According to the Office of the Director of National Intelligence, or ODNI, the IC ITE moves the intelligence community “from an agency centric IT architecture to a common platform where the community easily and securely shares technology, information, and resources.”

Wide information sharing between agencies can also present security risks—since the more agencies share information, the more people have access to sensitive data.

The IC ITE, lays the vision for an integrated intelligence enterprise throughout the IC’s 17 agencies. In essence, IC ITE changes the business model for intelligence agencies by mandating shared services. Instead of each agency building out each of its own systems, select agencies—either one or two of the larger-budgeted agencies—are charged with the responsibility of governing its major components.

The Role of Amazon in the National Security Strategy

If it sounds like a fancy way to say “cloud,” it is. The Central Intelligence Agency and National Security Agency are leading IC cloud computing development, with the CIA securing a $600 million contract with Amazon Web Services to build a cloud now usable for all the IC agencies. The NSA’s privately-hosted cloud—based on its internal cloud model—was launched in 2013. 

The other components of the IC ITE are: The IC desktop, an IC-wide applications mall and network requirement and engineering services. The Defense Intelligence Agency, or DIA, and National-Geospatial Intelligence Agency, or NGA, have jointly piloted shared desktop capabilities across their agencies for many thousands of users and those capabilities will soon spread throughout the IC.

(Related: Can You Have a Transparent Spy Agency?)

NSA also has the helm in leading an apps mall for IC agencies. The mall is based on its Ozone Widget Framework. And the National Reconnaissance Office, or NRO, is directed by IC ITE to optimize how disparate networks within the IC connect. The NRO, then, takes on a provider role in the IC for networks requirements and subsequent engineering activities, just as the CIA will for cloud services. 

Intelligence community leaders expect to save money both through consolidation and its cost-recovery model, with a net effect being improved national security.

Information Sharing vs. Terrorism

Information sharing as a strategy has already resulted in several important breakthroughs for the Obama administration, law enforcement and the national security community in recent weeks.

Expedited information sharing among agencies was key to the FBI’s linking North Korea to the recent Sony Hack, according to officials—specifically among NSA, the Department of Homeland Security and the FBI,. Adm. Michael Rogers, NSA chief and commander of Cyber Command, said, “We partner with the Department of Homeland Security and FBI in various areas and this is one such area…We were part of a broad interagency effort, not in the lead role—the Federal Bureau of Investigation was the overall lead. Yes, we were part of a broad government attempt to understand exactly what happened.”

Interagency information collaboration was also key to the FBI securing the identity of Jihadi John, the infamous masked Islamic State terrorist who killed James Foley and other hostages. FBI officials have not released the suspect’s identity. Intelligence from the Defense Department and foreign intelligence and law enforcement agencies was essential to identifying the fugitive, according to Stephen L. Morris, assistant director of the FBI’s Criminal Justice Information Services division. That effort was aided by in-person collaboration and interoperability between systems.

“Bottom line, you have to have something to search,” Morris told Defense One, at the recent Biometrics for Government and Law Enforcement conference in Washington. “This is where collaboration and interoperability are key. The FBI absolutely could not do its mission if we didn’t have interoperability with DHS and interoperability with DOD, because they have holdings in their biometric repositories, biometric information that they’ve collected lawfully… data that may be a piece that we don’t have. Maybe we have a finger print on an individual but they have a finger print and a passport photo.”

In the future, intelligence agencies will share even more biometric information taken from borders and at battlefields around the globe. The department of Homeland Security announced last month that they would be updating their Automated Biometric Identification System and would begin collecting iris scans and facial recognition scans at the border. Integration between that system and Department of Defense biometrically-enabled watch list, or BEWL, could yield better real time data about who is passing through critical checkpoints and whether or not they’ve ever interacted with U.S. troops.

Interagency information sharing will also include real time data about the online behaviors of millions of computer users. Last month, the Obama administration unveiled a cyber security proposal that federal agencies “to ensure that cyber threat indicators are shared with other federal entities in as close to real time as practicable.”

Update: The White House has also announced a new $35 million agency, the Cyber Threat Intelligence Integration Center, to better coordinate and digital data and intelligence amongst agencies. 

As previously outlined by Defense One, there are aspects of the proposal that are controversial, such as a provision that allows private companies to share user data with the government in possible violation of privacy act.

The idea of sharing citizen biometric data between intelligence agencies could prove to be a tricky sell. Wide information sharing between agencies can also present security risks, since the more agencies share information, the more people—the next Edward Snowden, perhaps—could have access to sensitive data. That can increase the likelihood of leak or data theft. Regardless, the national security strategy makes clear that information sharing between agencies will grow in years to come.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.