Homeland Security data-sharing systems criticized

The U.S. homeland security information-sharing structure was criticized Thursday by witnesses at a House subcommittee hearing -- with the failure to integrate existing communications systems being singled out as a major culprit.

Testimony before the Homeland Security Intelligence, Information Sharing and Terrorism Risk Assessment Subcommittee primarily focused on the Regional Information Sharing Systems, known as RISS, and the Homeland Security Information Network, or HSIN. The latter is a computer-based counter-terrorism system designed to connect all 50 states.

"I think we'd be living in a dream world if we believed that the HSIN is anywhere near where it needs to be," declared full committee Chairman Bennie Thompson, D-Miss.

Thompson said HSIN has been found to duplicate other information-sharing systems that can perform the same job for half the cost. He added that it does not integrate well with other systems and said the Homeland Security Department has not "clearly defined the system's purpose."

The department rushed to deploy HSIN following the Sept. 11, 2001, terrorist attacks, according to David Powner, director of information technology management issues for the Government Accountability Office. Powner said GAO has found that in developing HSIN, the department did not adequately account for key initiatives associated with RISS.

RISS is a national program of regionally oriented services designed to enhance the communication and coordination of federal, state and local agencies in fighting crime. That program has been in operation for about 25 years, well before HSIN was implemented.

Due to problems in integrating HSIN with the previously existing structure, Powner said HSIN "may be duplicating state and local capabilities" while running the risk that "effective information-sharing is not occurring."

Brian Tomblin, an official of the Tennessee Army National Guard's homeland security office, said "the problems and frustrations currently experienced with HSIN are all directly related to a lack of communication and clear guidance between [the U.S. Homeland Security Department] and state partners."

Wayne Parent, deputy director of operations coordination at Homeland Security, responded: "Over the past nine months, numerous improvements and enhancements to HSIN have been made, and I believe it has the potential [to] become the information-sharing and situational awareness tool it was envisioned to be. ... Work needs to continue to ensure there is robust connectively and interoperability with all [Homeland Security Department] partners."

William Harris of the Delaware State Police characterized RISS as the best information-sharing resource available. And Donald Kennedy, executive director of the New England State Police Information Network -- one of the six RISS centers -- noted its attributes in fighting crime.

"The federal government should provide the funding needed to leverage existing information-sharing systems and expand intelligence-sharing by executing interoperability between operating systems at the local, state, regional, federal and tribal levels," he said. "... Users should be able to access all pertinent information from disparate systems with a single sign-on, based on the user's classification level and need to know."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.