180 likes | 322 Views
TTIC and Information Sharing. TTIC exists, in large part, because before 9/11 the USG didn’t know what the USG already knew. Overview. General Context to Information Sharing An Issue of Balance Keeping Horizontal Integration in Perspective The Terrorism Context Why TTIC?
E N D
TTIC andInformation Sharing TTIC exists, in large part, because before 9/11 the USG didn’t know what the USG already knew
Overview • General Context to Information Sharing • An Issue of Balance • Keeping Horizontal Integration in Perspective • The Terrorism Context • Why TTIC? • TTIC and Information Sharing • TTIC initiatives • The Business Process Issue • Conclusions/Caveats
“Data Owner- Ship” Everything To Everybody ? An Issue of Balance • Sources & Methods: ORCON • Operational Considerations • U.S. Persons/Privacy issues • Technical interoperability Immediately devolve from the bumper sticker to the security, policy, legal technical issues. No quick fixes.
Knowledge Intelligence “Failures” Indian Nuc test NK TD-1 launch Chinese Embassy Iraqi WMD Horizontal Integration Data Horizontal Integration: Keeping Perspective What About 9/11? HI, without (a lot of) focus on analytic art, raises the specter of the IC simply being wrong faster….
Some background on TTIC… • Presidential Initiative • Independent joint venture • --5 partner orgs • --Reporting to DCI • Mission: “full integration • of terrorism information • collected domestically • or abroad” • Will be subsumed by • NCTC TTIC Law Enforcement Homeland Security Foreign Intel Military Intel Comprehensive Picture of Terrorist Threats
TTIC and Terrorism Info Sharing • Policy Context • Community Progress • TTIC access • TTIC Dissemination • Policy Context • (we’re all on notice) • DCID 2/4: “unfettered access” for • TTIC • Homeland Security Act: DHS gets • access to “all” terrorism info • Information Sharing MOU: terrorism • and WMD info “will” be shared. • HSPD 6: TTIC and TSC full access • to support identities data base and • watchlisting • DCID 8-1, Info Sharing EO….
Community Progress ORCON In 2003 • Community reporting increases by factor of 2.5 since 911 • ORCON down…but… • Tearlines up… • TTIC’s information sharing program office working with IC on range of impediments • Terrorist identities data base 10 years of tearlines
Information Sharing Framework WHITE HOUSE DIA State & Local Govt, Law Enf, Private Sector NSA FBI DoD NGA DHS TTIC *i.e., HHS, USDA, EPA, DOE OTHER GOVERNMENT AGENCIES * STATE CIA
OSIS CIA ADN CIA AIN CIA JWICS FBIS PRINCE ION NGANet ADNet DoJ JCON DoJ OASIS FBI Internet Cafe FBINet FBI SCION NCIC INSCOM IDCNet SIPRNet JWICS Stone Ghost DoE SEAS Dial-Up networks: TECS Secret Service USCG Intranet State INRSS State OpenNet NSANet NRO GWAN TTIC Network Connectivity Note:Not all analysts access all networks ortools; mission requirements determine access.
Good…and Bad News TTIC “rules of the road”: allow broad internal sharing Cumbersome: technical and security policy issues Sanctum Architecture will allow federated search In Pursuit of “Unfettered Access”
TTIC Strength: Information Sharing • TS/SCI HCS • Full range of products: finished reports; disseminated traffic; data bases • A data mart • The primary source of terrorism information for the USG • 120 participating organizations and growing
TOL Customers by OrganizationOct 04: 3500+ Active Users FBI (416) TTIC (129) 16% 5% STATE (50) 2% Other Federal Groups (128) 5% DHS (220) 8% WARN 7 CIA (503) CIA 19% DIA FBI NSA State/INR TTIC NSA (83) 3% DIA (216) 8% Other DOD (895) 34%
4 Separate terrorist identities data bases CIA DoD State/TIPOFF FBI Dozen watchlists, haphazardly maintained A single USG repository of international terrorist identities, foreign and domestic Supporting Terrorist Screening Center’s watchlisting effort Information Sharing of Terrorist Identities Intelligence Pre 9/11 TTIC/HSPD-6
Information Sharing FBI DHS TS/SCI Intelligence Community Information Analysis & Infrastructure Protection Office of the President Collaboration via TTIC Online Department of Defense FBI-JTTFs Border & Transportation Security Emergency Preparedness & Response Science & Technology Secret Law Enforcement Collaboration via TTIC Online SBU Collaboration via TTIC Online
Some Final Caveats Information Sharing: Necessary but Not Sufficient
Problem: A Lack of Critical Mass • Tooth to tail problem • Analysis: adding new knowledge vs packaging and situational awareness • “Analyst” population small Typical Terrorism Analytic Org Analytic Tooth Analysts AM Brief Warning Watch • Production Staff • Care & Feeding • Mgment overhead • Info technology • IMPACT • Shallow/redundant analysis • Enthusiastic amateur Tail Unfettered sharing without the appropriate business process can have pernicious downside impact
Conclusions/Caveats • Substantial progress/many initiatives… • …Much work to do • TTIC 2nd to none in support of info sharing • Caveats: • Be wary of the “bumper sticker” • Information sharing is no panacea • Dots won’t get randomly connected • Be careful: Not all opinions are equal • “Effective” info sharing of growing concern Must get the Business Process Right: NCTC