Information sharing

  • Boston marathonReport critical of intelligence, law enforcement Boston Marathon information sharing

    A 37-page report released by the House Committee on Homeland Security, asserts that the FBI and Customs and Border Protection (CBP) all failed properly to coordinate and investigate Tamerlan Tsarnaev in the years before his involvement in the deadly bombing attack at the Boston Marathon in 2013. “There were opportunities in which greater sharing of information might have altered the course of events, the report goes on to say, “Such failures must not be allowed to persist.”

  • CybersecuritySnowden’ leaks derailed important cybersecurity initiatives

    Edward Snowden’s leaks created such a climate of distrust around the NSA that many important cybersecurity initiatives died, stalled, or became non-starters. Security experts say that this is a case of throwing the baby out with the bathwater, and that the result of these stalled cybersecurity initiatives is that the United States is now more vulnerable to cyberattacks on its infrastructure, and government agencies and American corporations more exposed to sensitive information being compromised and stolen. U.S. officials have found it more difficult to respond to cyberattacks from Russia, China, and elsewhere. “All the things [the NSA] wanted to do are now radioactive, even though they were good ideas,” says James Lewis, a cybersecurity expert at the Center for Strategic and International Studies(CSIS).

  • Forensic ballisticsImproving the national ballistic data base

    A team of researchers identified a number of areas of improvement in a national database of forensic ballistics evidence used to link guns to violent crimes. The report, just released by the National Institute of Justice, already has led to improvements in the system called the National Integrated Ballistic Information Network (NIBIN), which is operated by the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF).

  • African securityKenya, Somalia to create joint anti-terrorism task force

    Al-Shabaab’s attack on the Westgate shopping mall in Nairobi last month has prompted security officials in Kenya and Somalia to consider the creation of a joint task force which will share intelligence, monitor activity, and track finances relating to terrorist groups operating in East Africa. Also under discussion is the establishment of a joint East African paramilitary force with jurisdiction throughout the region.

  • TECHEXPO - Exclusive Security-Cleared Hiring Events - Register Now!
    view counter
  • Venture capitalIID raises $8 million to scale shared cyberintelligence offering

    Despite the growing danger posed by cybercrime, information vital to stemming the tide is fragmented across the Internet today. Pockets of data about threat activity are siloed within the repositories of individual enterprises, government organizations, vendor networks, and research institutions. IID’s ActiveTrust enables enterprises and government agencies to combat the rising frequency and sophistication of cyberattacks by sharing cyber incident data in real time. IID has raised $8 million in Series A funding from Bessemer Venture Partners (BVP), and said it will use the investment to accommodate growing demand for ActiveTrust.

  • Information sharingThe DHS intelligence sharing it is and isn’t doing

    By Lee Maril

    The problems with inter-governmental information sharing are not the result of technology; technology per se rarely is the genuine factor leading to institutional error; certainly it can be, but all too often it is slandered and defamed as if it were human; in agency after agency, however, DHS computers simply do what they are told to do as determined by their managers who follow formal or informal institutional policies

  • SurveillanceFBI questions its relationship with NYPD, pt. 2

    In the first part of this article, we reported that the FBI’s relationship with the NYPD Intelligence Division has become strained, and as a result information exchange has been impaired as the FBI and other jurisdictions have objected to some of the actions NYPD has taken; today, we report on the NYPD’s view

  • SurveillanceFBI questions its relationship with the NYPD, pt. 1

    The split between the the FBI and the NYPD continues to grow, as the NYPD Intelligence Division takes on a far-reaching and aggressive role in intelligence gathering

  • Record sharingUpdated solution allows quick, secure information sharing

    Visual Alert 2 enables law enforcement agencies to get real-time access to police records through Pennsylvania’s Law Enforcement Justice Information System (LEJIS) and other authorized information sharing networks while the department maintains secure control of the information it shares

  • Guest columnThe challenge of fighting Lashkar-e-Toiba

    By Bidisha Biswas

    In her debut guest column, Bidisha Biswas, an associate professor of political science at Western Washington University, explores the threat that Lashkar-e-Toiba poses to the United States as well as India and Pakistan and what can be done to stop the extremist group

  • WMDInspectors uncover Qaddafi’s hidden WMD stockpile

    Last week international weapons inspector found clear evidence that the late Libyan dictator Moammar Qaddafi had large caches of hidden chemical weapons, despite making a promise to destroy all weapons of mass destruction weapons in 2004

  • Domestic terrorism Police chiefs at White House to discuss domestic radicalization

    Law enforcement officials from state and local agencies across the United States gathered on Wednesday at the White House to discuss the delicate balance between safeguarding against domestic extremism and maintaining the trust of the residents they serve

  • A closer look // By Eugene K. ChowWater pumps and terrorism-related information sharing systems

    With thousands of local law enforcement agencies, critical infrastructure operators, and concerned citizens reporting suspicious incidents, Homeland Security officials are inundated with data; effectively sorting through that information is a problem, as was illustrated last November by a report that a water pump at an Illinois water utility was broken by Russian hackers; the preliminary report caused panic about U.S. infrastructure vulnerability, but ultimately proved incorrect; it took more than a week for federal investigators to reach its conclusion, showing DHS ongoing problems with streamlining information sharing processes with its Fusion Centers

  • China teams up with Ukraine to fight terrorism

    Last week, top Chinese and Ukrainian security officials agreed to strengthen law enforcement cooperation between the two countries to combat terrorism, drug trafficking, illegal immigration, and trans-national crime; Ukrainian officials said it would work with China to combat cybercrime and other forms of trans-national organized crimes as well as the “three forces of evil” — terrorism, extremism, and separatism; Ukraine also pledged to provide more convenience for Chinese citizens entering and exiting its border; during China’s minister of public security Meng Jianzhu’s visit, the two countries signed cooperation documents

  • Rep. Peter King, House Homeland Security CommitteeAl Qaeda "very much alive"; U.S. needs to be "aggressive and preemptive"

    Representative Peter King (R-New York), the chairman of the House Homeland Security Committee, reflects back on the 9/11 attacks, discusses critical lessons learned, and the greatest threats facing the United States over the next decade; “—we have largely learned that we need to be aggressive and preemptive when it comes to our national security. Increasingly, we do not wait for an attack before we respond, but we go after and disrupt the threat before an attack can be launched; Law enforcement at all levels must follow suit, thinking more imaginatively and “outside the box.”