Bush details plan for more effective information sharing

President Bush on Monday unveiled details on the administration's plan to more effectively share terrorism-related information among federal, state and local governments, as well as the private sector.

Bush sent the details in the form of "guidelines" and "requirements" to the heads of government departments and agencies, and to lawmakers. The guidelines concern the role and scope of the authority of department chiefs. They also implement commonalities in technical standards and architectures to expedite the process of intra-government information sharing.

The changes aim to clarify how government officials should treat classified information as they share data. Additionally, the president's order would designate specific officials within government departments to handle information-sharing activities.

In a letter to Congress, Bush explained that the details are part of his effort to build the "information-sharing environment," or ISE, as required by a 2004 intelligence law.

"The ISE is intended to enable the federal government and our state, local, tribal and private-sector partners to share appropriate information relating to terrorists, their threats, plans, networks, supporters and capabilities while, at the same time, respecting the information privacy and other legal rights of all Americans," he wrote. "Creating the ISE is a difficult and complex task that will require a sustained effort and strong partnership with the Congress."

In April, Bush nominated former Energy Department Intelligence Director John Russack to expand the environment. Russack is a former CIA official and reports to John Negroponte, the national intelligence director. Russack held the first official meeting of the Information Sharing Council in November.

James Lewis, a Center for Strategic and International Studies' senior fellow, said the most critical elements of Monday's announcement concern the assignation of specific officials to handle information-sharing activities, the effort to build a common information architecture, and the revamped system for classifying information.

He noted that the changes still have to play out in the implementation process. In the past, the lack of clarity on how to effectively share sensitive terrorism-related information among federal and state authorities acted as major roadblocks in effective terrorist prevention, as noted by a key report issued by a commission investigating the Sept. 11, 2001, terrorist attacks, Lewis said.

Many of the information-sharing provisions in the 2004 intelligence act came from a report issued by the Markle Foundation. Michael Vatis, a former high-level government official and former executive director of the foundation's task force on national security in the information age, called the ongoing establishment of the president's information-sharing initiative "vital."

"[The initiative] actually creates a framework for sharing information while also protecting some of the legitimate interests of the security of the information," he said. The plan creates procedures for sharing information, and it calls for the use of technologies to selectively share information across the government.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.