Organization

Organization

ISE MISSIONS, SERVICES, AND ENABLERS

DHS and FBI Joint Analysis Report on Russian Malicious Cyber Activity

Sensitive But Unclassified Technical Advisory Committee National Interoperable SBU Federation Concept of Operation

Preventing Violent Extremism in Schools

UML Operational Threat & Risk Model Request for Proposal

--STATE AND MAJOR AREA FUSION CENTERS

Award for Excellence in the Field of Maritime Domain Awareness

Fellowship FAQ: PM-ISE Public Safety Information Sharing Officer

FirstNet ICAM Summit - Recommended Principles and Actions Report

National Strategy for the National Network of Fusion Centers - 2014–2017

A Solution Task Plan

ISE Guidance for Federal Resource Allocation Criteria

Privacy, Civil Rights, and Civil Liberties Compliance Verification for Fusion Centers

Fusion Center Privacy, Civil Rights, and Civil Liberties Template

Fact Sheet: Enhancing Fusion Center Privacy, Civil Rights, and Civil Liberties Protections 

Critical Infrastructure and Key Resources Protection Capabilities

Fusion Center Baseline Capabilities

National Criminal Intelligence Sharing Plan

Fire Service Integration for Fusion Centers

Common Competencies for State, Local, and Tribal Intelligence Analysts

Fusion Center Guidelines

--NATIONWIDE SUSPICIOUS ACTIVITY REPORTING

ISE SAR Functional Standard 1.5.5

NSI P/CR/CL Analysis and Recommendations Report

Fact Sheet: Privacy, Civil Rights and Civil Liberties Analysis and Recommendations Nationwide SAR Initiative

Privacy, Civil Rights, and Civil Liberties Analysis and Recommendations Nationwide SAR Initiative

NSI Technical Implementation Options

ISE-SAR Evaluation Environment Segment Architecture Segment Architecture

NSI Status Report Final

BJA Final Report ISE SAR Evaluation Environment

Fact Sheet NSI

Fact Sheet ISE-SAR Initiative

Fact Sheet - SAR Initial Privacy Analysis

ISE SAR Initial Privacy and Civil Liberties Analysis

ISE Administrative Memorandum - SAR Privacy Assessment

--PRIVACY, CIVIL RIGHTS, AND CIVIL LIBERTIES

Appendix B – Basic Civil Liberties - Framework of Considerations for Streamlining the Terrorism-­‐Related Information Sharing and Access Agreement Development Process

Appendix A – Fair Information Practice. Principles (FIPPs) - Framework of Considerations for Streamlining the Terrorism-­‐Related Information Sharing and Access Agreement Development Process

Appendix D - Streamlining Information Sharing Agreement Development Process - Worksheet

Streamlining the Terrorism-Related Information Sharing and Access Agreement Development Process and Incorporating Privacy, Civil Rights, and Civil Liberties Best Practices

Appendix C – Streamlining Information Sharing Agreement Development Process - Worksheet

Frequently Asked Questions on the ISE Privacy Guidelines

Privacy Implementation Workbook v1.2

Privacy Guidelines Committee Governance

Civil Rights and Civil Liberties Protections Guidance

Privacy Implementation Workbook v1.1

PGC Co-chair Memo to ISE Privacy Officials on Privacy Guidelines and Implementation Manual

Key Issuance Guidance

Privacy and Civil Liberties Implementation Guide for the Information Sharing Environment

Issuance Memorandum: Privacy and Civil Liberties Implementation Manual for the Information Sharing Environment

Fact Sheet: Privacy and Civil Liberties Implementation Guide for the Information Sharing Environment

ISE Privacy Glossary

Privacy Guidelines Committee Charter

Information Sharing Environment Privacy Guidelines FAQ

Introduction to ISE Privacy Guidelines

Issuance Memorandum: ISE Privacy Guidelines

ISE Privacy Guidelines

Guideline 5 Report - Guidelines to Implement Information Privacy Rights and Other Legal Protections in the Development and Use of the Information Sharing Environment

List of Resources for ISE Privacy and Civil Liberties Implementation Manual

 

--COMMON INFORMATION SHARING STANDARDS

Priority Objective 3 Data Tagging Functional Requirements Document

Introduction to ICAM Principles

Digital Policy Management Framework for Attribute-Based Access Control

ISE-AM-300R - Common Terrorism Information Sharing Standards (CTISS) Program - Rescinding of ISE-AM-300

Functional Standards Brochure

ISE Memo: Release of the Information Sharing Environment Functional Standard for Suspicious Activity Reporting

Fact Sheet: Update to Suspicious Activity Reporting Functional Standard Provides Greater Privacy and Civil Liberties Protections

Fact Sheet: Initial Suite of Technical Standards for the Information Sharing Environment

ISE-G-108: Identity and Access Management Framework for the ISE

ISE-FS-200: Suspicious Activity Reporting (SAR)

ISE Functional Standard for Suspicious Activity Reporting (ISE-FS-200)

ISE-AM-300: Common Terrorism Information Sharing Standards (CTISS) Program

CTISS Program Manual

--ENTERPRISE ARCHITECTURE FRAMEWORK

Geospatial Interoperability Reference Architecture (GIRA)

Common Profile Framework v.2.0

Digital Policy Management Framework for Attribute-Based Access Control

Data Aggregation Reference Architecture (DARA) v.1.0

ISE Information Interoperability Framework

Info Sharing Success: Global Nuclear Detection Architecture

Fact Sheet: Information Sharing Environment Profile and Architecture Implementation Strategy (PAIS)

ISE-G-108: Identity and Access Management Framework for the ISE

NEWS RELEASES, SPEECHES, AND PRESENTATIONS

Kshemendra Paul's HCHS Subcommittee SFR Hearing on Fort Hood

A Brief History of the ISE

DoD Takai and Ferguson Joint Statement for the Record, Senate HSGAC Hearing March 2011

IC ISE Corin Stone Statement for the Record, Senate HSGAC Hearing March 2011

Kshemendra Paul's Statement for the Record March 2011

ISE Message at BJA National Conference: Advancing Justice through Evidence and Innovation

Transcript of Kshemendra Paul Keynote Address at CSIS. Building Beyond the Foundation: Accelerating the Delivery of the Information Sharing Environment

Information Sharing Environment Implementation Plan Report Sent to Congress

 

ISE REPORTS AND MESSAGES TO CONGRESS

Brief History of the Information Sharing Environment

2007 ISE Annual Report to Congress

2008 ISE Annual Report to Congress

2009 ISE Annual Report to Congress

2010 ISE Annual Report to Congress

2011 ISE Annual Report to Congress

2012 ISE Annual Report to Congress

2013 ISE Annual Report to Congress

2014 ISE Annual Report to Congress

2015 ISE Annual Report to Congress

2015 HSIN Annual Report to Congress

2012 ISE Performance Data

2013 ISE Performance Data

2010 Report on the Interagency Threat Assessment and Coordination Group Report

Fact Sheet: 2010 ITACG Report

Report to Congress on the Interagency Threat Assessment and Coordination Group

Establishing the Interagency Threat Assessment and Coordination Group

ITACG Intelligence Guide for First Responders 2nd Edition

ISE Implementation Plan

Interim ISE Implementation Plan

Preliminary Report on the Creation of the Information Sharing Environment

BACKGROUND, AUTHORITIES, AND GUIDANCE

Protecting Houses of Worship - Event Resource Guide

Brief History of the Information Sharing Environment

ISE Management Plan

Performance Scenario Guide

ISE-G-105, “Inclusion of Information Sharing Performance Elements in Employee Performance Appraisals”

Major Cities Chiefs Endorse Information Sharing Strategy

Governors' Homeland Security Advisors Endorse Strategy

Fact Sheet: National Strategy for Information Sharing

Global Justice Information Sharing Initiative Endorses Strategy

ISE-G-104, “Implementation of the Information Sharing Environment Core Awareness Training”

IRTPA Intelligence Reform and Terrorism Prevention Act of 2004 Amended

IACP Endorses National Strategy for Information Sharing

PL 110-53, Implementing Recommendations of the 9/11 Commission Act of 2007

PL 107-56, Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA Patriot Act)

2012 National Strategy for Information Sharing and Safeguarding

Executive Order 13587: Responsible Information Sharing

Executive Order 13526: Classified National Security Information

Strengthening Information Sharing and Access, Memorandum

Presidential Memorandum: Designation and Sharing of Controlled Unclassified Information (CUI)

National Strategy for Information Sharing 2007

Presidential Memorandum: Guidelines and Requirements in Support of the ISE

Executive Order 13388: Further Strengthening the Sharing of Terrorism Information To Protect Americans

Executive Order 13356: Strengthening the Sharing of Terrorism Information To Protect Americans

Executive Order 13311: Homeland Security Information Sharing

Executive Order 12333: United States Intelligence Activities

Guideline 4 Report - Facilitate Information Sharing Between Executive Departments and Agencies and Foreign Partners

Guideline 2 Report - Departments and Agencies and State, Local, and Tribal Governments, Law Enforcement Agencies, and the Private Sector

The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction

The National Commission on Terrorist Attacks Upon the United States (also known as the 9-11 Commission)

The following are archived resources:

 

 

The Information Sharing Environment (ISE) consists of the people, projects, systems, and agencies that enable responsible information sharing across the national security enterprise. The ISE was established by the Intelligence Reform and Terrorism Prevention Act of 2004 and a direct result of 9/11 Commission recommendations. Law enforcement, defense, and intelligence personnel rely on timely and accurate information to keep America safe, and the ISE makes that happen by:

 

  • Advancing responsible information sharing to further counterterrorism, homeland security, and counter weapons of mass destruction missions
  • Improving nationwide decision making by transforming from information ownership to stewardship
  • Promoting partnerships across federal, state, local, and tribal governments, the private sector, and internationally

 

A robust ISE strengthens national security by facilitating the sharing and safeguarding of terrorism-related information. Granted government-wide authority by the U.S. Congress, the ISE serves as a trusted broker, facilitating the development of a network-centric ISE by promoting standards and architecture, security and access, and associated privacy protections.

 

  Who We Are                    Mission & Vision    
    History              Background & Authorities Contact

 

 

Subcategories

This is the description

Mission stories description

ISE right sidebar

ISE Blog description