Terrorism-Related Information Sharing
Recent planned and attempted acts of terrorism on U.S. soil underscore the importance of the governments continued need to ensure that information on potential terrorist threats is shared in an effective and timely manner.
The sharing of terrorism-related information has been designated as high risk because the government faces formidable challenges in analyzing and disseminating this information in a timely, accurate, and useful manner. Federal agencies have created new organizations, systems, partnerships, tools, and standards, among other things, to better share this information with each other and with state, local, tribal, and private security partners, but still have work to do to close gaps in sharing. Federal agencies can reduce risk on terrorism-related information sharing by focusing on several areas:
- Defining, developing, and implementing the remaining capabilities and technologies needed for sharingsuch as developing automated means to determine who is authorized to access dataand leveraging successful initiatives that individual agencies implement for the benefit of all homeland security partners.
- Developing cost estimates for needed programs and initiatives, which would allow decision makers to plan for and prioritize future investments.
- Building information-sharing initiatives into agencies enterprise architectures to help align technology investments as a means to promote sharing.
- Establishing a system of accountability to track progress and measure the information-sharing and homeland security benefits achieved to inform future investments, including ways to measure the benefits the government is deriving from multimillion-dollar federal investments in state and local fusion centersstate and local entities, supported in part with federal funding and personnel, that coordinate and collaborate with respect to sharing information related to criminal and terrorist activity and that fill information sharing gaps the federal government could not address.
- Assessing the impacts of the governments use of the terrorist watchlist to screen individuals for threats on agencies, their resources, and the traveling public to ensure that use of the list is working effectively and as intended, and that any needed adjustments are implemented.
Figure 1: Overview of the Terrorist Watchlist Nominations Process
GAO-14-397: Published: Jun 4, 2014. Publicly Released: Jun 4, 2014.
GAO-13-471: Published: Apr 4, 2013. Publicly Released: Apr 4, 2013.
GAO-13-233: Published: Mar 13, 2013. Publicly Released: Mar 13, 2013.
GAO-12-809: Published: Sep 18, 2012. Publicly Released: Sep 18, 2012.
GAO-12-476: Published: May 31, 2012. Publicly Released: May 31, 2012.
GAO-14-608T: Published: May 14, 2014. Publicly Released: May 14, 2014.
GAO-14-532T: Published: May 7, 2014. Publicly Released: May 7, 2014.
GAO-14-365T: Published: Feb 27, 2014. Publicly Released: Feb 27, 2014.
GAO-13-616: Published: Jul 30, 2013. Publicly Released: Jul 30, 2013.
GAO-12-464T: Published: Mar 8, 2012. Publicly Released: Mar 8, 2012.
GAO-12-144T: Published: Oct 12, 2011. Publicly Released: Oct 12, 2011.
GAO-11-661: Published: Jun 23, 2011. Publicly Released: Jun 23, 2011.
GAO-11-335: Published: May 5, 2011. Publicly Released: May 17, 2011.
GAO-11-508T: Published: Mar 30, 2011. Publicly Released: Mar 30, 2011.
GAO-10-972: Published: Sep 29, 2010. Publicly Released: Sep 29, 2010.