Creating a Trusted Information Network for Homeland Security Second Report of the Markle Foundation Task Force
Total Page:16
File Type:pdf, Size:1020Kb
Creating a Trusted Network for Homeland Security Second Report of the Markle Foundation Task Force zoë baird, james barksdale chairmen michael a. vatis executive director Copyright © 2003 Markle Foundation All rights reserved. ISBN 0-9747809-0-1 markle foundation task force on national security in the information age Chairmen Slade Gorton James Dempsey Preston, Gates & Ellis Center for Democracy and Technology Zoë Baird Markle Foundation Morton H. Halperin Mary DeRosa Open Society Institute Center for Strategic and International James L. Barksdale Studies The Barksdale Group Margaret A. Hamburg Nuclear Threat Initiative Lara Flint Executive Director Center for Democracy and Technology John J. Hamre Michael A. Vatis Center for Strategic and International Lauren Hall Markle Foundation Studies Microsoft Members Eric Holder Jeff Jonas Covington & Burling Systems Research & Development Alexander Aleinikoff Georgetown University Law Center Arnold Kanter James Lewis The Scowcroft Group Center for Strategic and International Robert D. Atkinson Studies Progressive Policy Institute Michael O. Leavitt Governor of Utah Terrill D. Maynard Stewart Baker Steptoe & Johnson Tara Lemmey Mary McCarthy Project LENS Center for Strategic and International Eric Benhamou Studies 3Com Corporation Gilman Louie In-Q-Tel Patrick J. Sullivan, Jr. Jerry Berman Cherry Creek Schools Center for Democracy and Technology Judith A. Miller Williams & Connolly Winston Wiley Robert M. Bryant Booz Allen Hamilton National Insurance Crime Bureau James Morris Carnegie Mellon University Associate Director Ashton Carter Harvard University Craig Mundie Mary McKinley Microsoft Markle Foundation Wesley P. Clark Wesley P. Clark & Associates Jeffrey H. Smith Task Force Staff Arnold & Porter Wayne Clough Nancy Boursiquot Georgia Institute of Technology Abraham D. Sofaer Administrative Assistant Stanford University William P. Crowell Todd Glass Security and Intelligence Systems James B. Steinberg Director, Public Affairs The Brookings Institution Sidney D. Drell Caroline McCarus Stanford University Paul Schott Stevens Assistant to the President Dechert LLP Esther Dyson Jennifer Obriski EDventure Holdings Rick White Administrative Assistant TechNet Amitai Etzioni Stefaan Verhulst The George Washington University Participating Experts Chief of Research (non-government) David J. Farber Carnegie Mellon University Bruce Berkowitz RAND John Gage Sun Microsystems, Inc. Robert Clerman Mitretek Systems Table of Contents Acknowledgements Overview Part One: The Task Force Report Achieving a networked community for homeland security ......................................................................1 Assessment of government progress toward a trusted, decentralized network...................................2 Information sharing and analysis ..........................................................................................................2 Utilizing privately held data....................................................................................................................5 Building a networked community for homeland security.........................................................................8 Vision and objectives..............................................................................................................................8 Exhibit A: Action plan for federal government development of the SHARE network ...................9 Closing the gaps between agencies .....................................................................................................11 Scenario-based concept of operations................................................................................................13 Designing a robust architecture for the future..................................................................................13 Exhibit B: Weaknesses in the current information-sharing system................................................14 Exhibit C: Authentication technology.........................................................................................15 Exhibit D: Attributes of the SHARE network ........................................................................17 Participants in the network: organizational structure.......................................................................18 The federal participants........................................................................................................18 Exhibit E: Joint Terrorism Task Forces (JTTFs) .....................................................................20 Decentralized analytic nodes ...............................................................................................21 The road to a culture of distribution .................................................................................................22 Measuring performance .......................................................................................................................24 Exhibit F: Evaluating improvements in information sharing and analysis ..................................25 Accessing private sector data .........................................................................................................................30 Information available in the private sector ........................................................................................30 Identifying the private sector information the government needs ................................................31 Guidelines for government use of private sector information........................................................32 Acquisition and use of private sector data.........................................................................33 Government retention of private sector data....................................................................34 Sharing private sector data with agencies not involved in counterterrorism ................35 Accountability and oversight ...............................................................................................35 Exhibit G: Evaluating improvements in the government’s use of private sector data while protecting civil liberties ..............................................................................................................................37 Future work of the Task Force ......................................................................................................................39 Conclusion ...........................................................................................................................................................39 Additional Papers ..............................................................................................................................................40 MARKLE FOUNDATION Acknowledgments The Task Force issued its first report in October 2002. drafting sections of our report, and informing our efforts This initial report was seen as a useful contribution by a with their knowledge and creativity. On policy and gov- broad cross section of those concerned with the new envi- ernmental issues, Jim Steinberg, Amitai Etzioni, Stewart ronment for America’s homeland security. We decided to Baker, and Task Force associates Mary DeRosa, Mary continue our work and developed an agenda for further McCarthy, Winston Wiley, Terry Maynard, and Jim action. The Task Force began its second year in March Dempsey developed innovative approaches, careful 2003. Renewing its commitment to providing the gov- research, compelling ideas, and drafts of sections of the ernment with practical recommendations informed by report. These people and the many other members and diverse perspectives, the Task Force organized several associates of the Task Force put in dozens of hours meld- areas of work, leading up to a summer plenary meeting. ing their expertise into a common understanding of the At that meeting, Task Force members agreed that we interplay between technology and policy. They attended should issue a second report by the end of this year, given meetings, reviewed documents, consulted one another via the urgent need for our government to improve its ability email or telephone, and sought advice and information to use information to protect our nation. from other professionals. We cannot adequately thank them here for their wisdom and dedication. We organized two Working Groups. Working Group I, ably led by Tara Lemmey and Bill Crowell, focused on Eric Benhamou, among his other contributions, helped how to construct a network for sharing and analyzing us chair our principal plenary meeting. Lauren Hall and information among governmental entities at all levels and a team at Microsoft—drawn together by Task Force relevant private sector organizations. This Working member Craig Mundie—assisted Tara Lemmey in help- Group’s paper is included in Part Two of our report. ing us think through how to create visual representations Working Group II, equally ably led by Gilman Louie and of our recommendations. Jim Steinberg, addressed the issue of how our government can more effectively utilize privately held data while pro- Stefaan Verhulst, Lara Flint, and Tanvi Madan provided tecting privacy and other civil liberties. This Working valuable research assistance. Todd Glass handled our public Group’s paper, too, is in Part Two. We also convened a education and outreach, and Karen Thomas provided an smaller subgroup, thoughtfully led by Amitai Etzioni, to excellent platform on the Internet for the Task Force’s consider