Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Information Sharing Environment ready for Act III of its development
Wednesday - 9/14/2011, 5:43am EDT
By Jason Miller
Federal News Radio
To understand how the government overcame one of the biggest failures of 9/11, look no further than the Terrorist Screening Center.
Over the last five years, the number of positive hits against the terrorist watchlist has increased significantly.
Kshemendra Paul, the program manager for the Information Sharing Environment, said the center receives about 150 calls a day from law enforcement officials asking about suspicious persons.
"Thirty to 40 percent of those encounters are positive matches to individuals on the terrorist watchlist," he said in an interview with Federal News Radio from his Washington office. "Between 2005 and 2010, the number of encounters increased by 60 percent, reflecting better quality data and broader use of the watchlist."
Paul said this basic example of the increase of positive hits against the watchlist shows the breadth and depth of information sharing.
"I've been really struck by far how we've come," said Paul, who has been the program manager since May 2010 and previously worked as the federal chief architect at the Office of Management and Budget. "Universally, I'm hearing about the importance of information sharing and the progress we've made and also importantly, while celebrating the progress, the journey is not yet finished. I think about this office as a multi-act play."
Act I, in 2004, began when the ISE first started working on governance, collaboration and establishing initial policies.
Then in 2007, the ISE led the development and release of the National Strategy for Information Sharing. The plan helped build out the domestic sharing capabilities with state and local "Fusion Centers" and bolstered suspicious-activity reporting.
"My coming to the office in 2010, I looked at that as opening the aperture that is the direction I got from the White House — open the aperture to the totality of terrorism-related information sharing," he said. "I've put an emphasis on the data-centric visions that was put forward by the 9/11 Commission, the Markel Foundation and the original law. I've pushed for standards and architecture and worked with industry to accelerate the development of the ISE. So now here we are with a strategy refresh and a greater emphasis on responsible information sharing ready for the future."
Along with what the ISE has done to improve information sharing, Paul said the greater recognition of the importance of information sharing comes from the widespread adoption of best practices promoted by the ISE.
He said the Nationwide Suspicious Activity reporting initiative is a perfect example of this adoption of best practices. About 150,000 uniformed law enforcement officers have gone through training, he said, including 50,000 from the Homeland Security Department, to look for certain behaviors based on the standard. And the Coast Guard is training not only their Coast Guardsmen but also their civilian employees.
Now, law enforcement officers at all levels of government are working from a common lexicon, making sharing data much easier.
But Paul said the counterterrorism mission isn't a federal-only mission.
"The Nationwide Suspicious Activity reporting initiative is "neighborhood watch" for the nation," he said. "And the nation is involved in a way that is strengthening our security, making our nation safer and strengthening privacy and civil liberties."
Paul said the network to gather and share information has matured over the last seven years, starting with the state and local Fusion Centers.
ISE, DHS and others did a baseline capability assessment of the centers around four operating areas:
- Ability to disseminate time sensitive alerts, warnings and notifications, including those that may be classified.
- Ability to do local risk assessment based on local conditions and criteria
- Ability to further disseminate critical information to frontline employees and first responders
- Ability to gather and share information through Fusion Centers and with federal government
"We were able to measure increases in maturity along all those four dimensions to the point of can we effectively share information with state and locals?" Paul said. "The answer is absolutely, and the results are there to see."
Three or four years ago the Fusion Centers were all in the same place, he said, but now there is a much better level of operating capability across the board.
"After we did the baseline capability assessment last year, DHS worked closely with the 72 Fusion Centers and state and local partners to develop a mitigation strategy to quickly develop that uniform capability across the network," Paul said. "The Fusion Centers are all crimes, all hazards. The business case has to be broader locally than just the counterterrorism mission. We are seeing a lot of that and there is synergy that occurs. You see that with the Nationwide Suspicious Activity reporting initiative. A lot of the SARs that come in, you don't know a priority is terrorism related or drug related so you need that synergy to get that business case."