Intelligence and Information Sharing
In: Intelligence and Counterintelligence Studies
Intro -- INTELLIGENCE AND INFORMATION SHARING: NEEDS, GOALS AND RISKS -- INTELLIGENCE AND INFORMATION SHARING: NEEDS, GOALS AND RISKS -- CONTENTS -- PREFACE -- Chapter 1 INTELLIGENCE INFORMATION: NEED-TO-KNOW VS. NEED-TO-SHARE -- SUMMARY -- BACKGROUND -- CHANGES UNDERTAKEN IN RESPONSE TO 9/11 -- The Information Sharing Environment -- LIMITATIONS AND RISKS OF INFORMATION SHARING -- Detroit Bomb Attempt -- Fort Hood Shooting -- WikiLeaks -- CONCLUSION -- End Notes -- Chapter 2 TERRORISM INFORMATION SHARING AND THE NATIONWIDE SUSPICIOUS ACTIVITY REPORT INITIATIVE: BACKGROUND AND ISSUES FOR CONGRESS -- SUMMARY -- BACKGROUND -- WHY INFORMATION SHARING? -- Information-Sharing Systems -- SUSPICIOUS ACTIVITY REPORTING -- NATIONWIDE SUSPICIOUS ACTIVITY REPORTING INITIATIVE (NSI) -- PRIVACY AND CIVIL LIBERTIES IMPLICATIONS -- ISE SAR Functional Standard -- NSI PILOT PROJECT -- ISE Shared Spaces Architecture -- Training -- ISE-SAR EE Lessons Learned and the Way Ahead -- CURRENT ADMINISTRATION ACTIONS -- ISSUES FOR CONGRESS -- Too Many "Dots " -- Training -- Data Privacy and Access -- Information Technology (IT) Infrastructure -- Metrics -- APPENDIX A. SIGNIFICANT INFORMATION-SHARING SYSTEMS -- Law Enforcement Online (LEO) -- Regional Information Sharing Systems Program (RISS) -- Homeland Security Information Network (HSIN) -- Law Enforcement Information Sharing Program (LEISP) -- OneDOJ System -- Law Enforcement National Data Exchange (N-DEx) -- FBI Terrorist Tracking Systems -- Guardian -- eGuardian -- APPENDIX B. ACRONYMS USED IN THIS REPORT -- End Notes -- Chapter 3 INFORMATION SHARING ENVIRONMENT: BETTER ROAD MAP NEEDED TO GUIDE IMPLEMENTATION AND INVESTMENTS -- ABBREVIATIONS -- WHY GAO DID THIS STUDY -- WHAT GAO RECOMMENDS -- WHAT GAO FOUND -- BACKGROUND -- History of the Information Sharing Environment -- Our Previous Reports on ISE Efforts