In Plain View: Making Open Source Intelligence a Priority
In the virtual public square, the most valuable intelligence might not be so secret. In fact, the intelligence might be in plain view. During the trial of Dzhokhar Tsarnaev, the public discovered that the Boston Marathon bombers learned how to build their weapons not in a clandestine operation, but from Al-Qaeda’s public and free online magazine, Inspire. Everything the Tsarnaevs knew about terrorism came from open source information.

Using Intelligence to Identify Border Threats
The United States confronts a wide array of threats. Terrorism. Transnational criminal organizations. Drug and weapons smuggling. Human trafficking. Cybercrime. And the ongoing challenge of illegal migration across U.S. borders.
Interagency Barriers and the Boston Bombing
With the investigation of the Boston bombing still underway and largely concealed, it is difficult to access the origin of Tamerlan Tsarnaev’s radicalization
Ingenuity and Information Sharing
The current progress in Congress on the Cyber Intelligence Sharing and Protection Act (CISPA), which would establish an information exchange between the Intelligence Community and the private sector, is encouraging news.
Cyber Attacks Leading Threat Against U.S.: Spy Agencies
Reuters
Intelligence leaders said for the first time on Tuesday that cyber attacks and cyber espionage have supplanted terrorism as the top security threat facing the United States.
Intelligence leaders said for the first time on Tuesday that cyber attacks and cyber espionage have supplanted terrorism as the top security threat facing the United States.
Advancing the Information Sharing Environment: DHS Updates its Information Sharing Segment Architecture to v3.0
ISE.gov
DHS CIO, Richard Spires, recently announced an update to the DHS Information Sharing Segment Architecture (ISSA).
DHS CIO, Richard Spires, recently announced an update to the DHS Information Sharing Segment Architecture (ISSA).
This is How China Hacks America: Inside the Mandiant Report
The Daily Beast
Cybersecurity firm Mandiant released a massive and scathing report identifying a unit of the Chinese government that has hacked 115 U.S. companies. Here are the critical details.
Cybersecurity firm Mandiant released a massive and scathing report identifying a unit of the Chinese government that has hacked 115 U.S. companies. Here are the critical details.
NATO Uses Twitter for Intelligence Gathering
ExecutiveGov
Following the social disruptions and political upheaval of the Arab Spring, it should come as no surprise that monitoring social networks, such as Twitter, is quickly becoming an important intelligence-gathering technique.
Following the social disruptions and political upheaval of the Arab Spring, it should come as no surprise that monitoring social networks, such as Twitter, is quickly becoming an important intelligence-gathering technique.
Homeland Security and Collective Intelligence
The Christmas Day bombing in 2009 highlighted the need for a broader collective view of intelligence and information sharing across agencies.
DHS Will Establish Consolidated Intelligence Portal
Nextgov
Bottom-up review of Homeland Security Department operations emphasizes need for technology to improve information sharing.
Bottom-up review of Homeland Security Department operations emphasizes need for technology to improve information sharing.