Additional Resources

Additional Resources

RISSRISS supports efforts against organized and violent crime, gang activity, drug activity, terrorism, human trafficking, identity theft, and other regional priorities, while promoting officer safety.


RISS is composed of six regional centers and the RISS Technology Support Center.  RISS works regionally and nationwide to respond to the unique crime problems of each region while strengthening the country’s information sharing environment.  RISS supports efforts against organized and violent crime, gang activity, drug activity, terrorism, human trafficking, identity theft, and other regional priorities.  RISS is used and trusted by hundreds of thousands of law enforcement officers and criminal justice professionals.  RISS supports thousands of local, state, federal, and tribal law enforcement and public safety agencies in every state.


For more than 40 years, RISS has demonstrated its value and benefit to the criminal justice and law enforcement community.  RISS provides critical investigative and analytical services, secure access to intelligence systems and investigative data from all levels of government, technology- and field-based solutions, and essential officer safety resources.


RISS operates the RISS Secure Cloud (RISSNET), which is a sensitive but unclassified (SBU) system that connects disparate systems, provides bidirectional sharing, and offers a single simultaneous search of connected systems.  Hundreds of resources (most owned by RISS partners) rely on the RISSNET infrastructure to share millions of records among and between law enforcement from all levels.  Currently, 84 systems are connected or pending connection to RISSNET.  More than 37 million records are available through these and other RISSNET resources.


RISS has developed a number of resources accessible via RISSNET that are critical to the law enforcement community’s mission, including the following:



For more information on RISS, visit



Intelink is a set of web-based services, tools, technologies and information repositories. Its purpose is to share intelligence  and related information between intelligence producers and consumers across the National Security Enterprise.



Intelink-U (Intelink-SBU) is a sensitive but unclassified (SBU) variant of Intelink which was established for use by U.S. federal organizations and properly vetted state, tribal, and local officials so sensitive information and open source intelligence could be shared amongst a secure community of interest. Intelink-U was formerly known as the Open Source Information System (OSIS).

Since passage of the Computer Security Act of 1987, the U.S. Government has worked to increase access to information at the sensitive but unclassified (SBU). The mission of SBU is to provide federal, state, local, tribal, and territorial law enforcement officers and analysts with a seamless, single sign-on ability to access data stored in multiple mission partner systems. This requires a federated approach to the reuse and scaling of services, structured data definitions, formalized authentication and authorization policies, and the development of data exchange standards.


In order to more efficiently coordinate these efforts and bring together key government stakeholders, the Sensitive But Unclassified Technical Advisory Committee (STAC) charter was signed in 2016. The mission of the STAC is leverage current enterprise services, share best practices in information sharing and safeguarding, and meet regularly to resolve interagency challenges to promote public safety and combat terrorism. The STAC membership currently includes:


PM-ISE has published or sponsored several key foundational frameworks and products that have set the path for government-wide information sharing to enable a number of critical national security and public safety missions. The purpose of Project Interoperability (PI) is to promote the development of counterterrorism-related Information Sharing Environments (ISEs) between communities of interest (COIs) and to advocate for particular standards and technologies most likely to achieve the desired information sharing results and future compatibility between those ISEs. Interoperability allows organizations to:


  • Share information
  • Leverage resources
  • Reduce duplicative systems
  • Cut excessive costs

Interoperability is the ability to transfer and use information in a consistent, efficient way across multiple organizations and IT systems to accomplish operational missions. From a technical point of view, interoperability is developed through the consistent application of design principles and standards to address a specific mission problem. Administrative preconditions to interoperability, such as policies and procedures, must be in place to exchange and safeguard the information. PI achieves its mission through an integrated suite of technical and operational resources and expertise facilitating the planning, development, and optimization of ISEs to share counterterrorism and other mission-critical information. Those resources include the ISE Core Interoperability Framework (ICIF) and the ISE Integration Library.


For more information visit: Project Interoperability on GitHub.

In the context of national security and critical infrastructure, a “domain” refers to all areas and things of, on, under, relating to, adjacent to, or bordering a specific space whether land, sea, or air that could impact activities, infrastructure, people, cargo, vessels, etc. that move or operate within the space. A domain can be either physical, i.e. maritime domain of a sea, ocean, or other navigable waterway, or conceptual, i.e. cyber domain of networked systems.


Domain awareness is understanding how domains operate and interact within their environment and how they could impact the security, safety, economy, or environment of the U.S. is crucial to supporting the protection of the U.S.'s National Critical Infrastructure and Key Resources (CIKR). CIKR are both privately owned and operated and an unprecedented partnership between government and the private sector has formed in recent years to ensure their protection and resiliency.


This partnership is at the heart of the National Infrastructure Protection Plan (NIPP), which sets forth a comprehensive risk management framework coordination and information sharing and clearly defined critical infrastructure protection roles and responsibilities. The NIPP provides a coordinated approach that is used to establish national priorities, goals, and requirements for infrastructure protection to ensure funding and resources are applied in the most effective manner. The partnership now includes more than 200 trade associations from every CIKR sector and representing more than 4 million members.


Establishing information sharing environments (ISEs) that facilitate the protection of CIKR is a priority for federal, state, local, tribal, territorial, and private sector partners. The ultimate goal is to create a nationwide network in which all CIKR partners can collaborate to prepare for, protect against, respond to, and recover from a terrorist attack, national disaster, or other emergency.

Protecting America from Cyber Attack


Detecting and disrupting cyber attacks before they happen is no easy task. It requires the skill, expertise, and resources of multiple agencies working together to defeat those who seek to harm the American people via cyber channels. Foreign governments, criminal networks, and lone hackers are relentless in their attempts to wreak havoc in cyber space. Currently, the cyber mission follows three unique goals which drive cyber engagement to determine current solutions and if they meet the greater Information Sharing Environment’s (ISE) needs:

  • Support partners to integrate and scale state-wide ISEs
  • Further align the field-based intelligence and information sharing entities
  • Support development of domain and departmental ISEs

Responding to this threat, federal, regional, state, and local government and private sector entities are taking steps to protect and defend these exchanges. Additionally, defining cyber crimes, computer crimes, and cyber terrorism requires developing a common vernacular among mission partners. PM-ISE, owing to our longstanding relationships across these communities, is uniquely positioned to foster responsible information sharing practices in a “virtual” ISE that safeguard national security, enhance law enforcement investigations, and provide needed context for intelligence analysts.


Cyber Information Sharing: Breaking New Ground


Law enforcement and national security personnel are using their well-honed information sharing skills to devise new programs, processes, and standards in the cyber realm. The same enduring interagency partnerships that formed after September 11th to fight terrorism are now focusing on the growing cyber threat. PM-ISE has built relationships with and among today's cyber trailblazers including:

  • National Governor’s Association Cybersecurity Summit
  • Fusion Center Cyber Pilot
  • Information Sharing Architecture Executive Committee (ISA EXCOM)
  • Association of State Criminal Investigative Agencies (ASCIA) Sub-Committee on Cyber Crime
  • International Associate Chiefs of Police (IACP) Law Enforcement Cyber Center


HSIN Videos

Homeland Security Information Network users explain how the trusted network supports their homeland security mission operations to share sensitive but unclassified information.

ISE Training

Core Awareness Training provides an overview of the ISE and includes a significantly expanded discussion on privacy, civil rights, and civil liberties protections.


ISE mission partners at all levels of government work to put safeguards in place to ensure the protection of privacy, civil rights, and civil liberties of citizens.