Los Angeles Times

Forget leaks, worry about unshared intel

Domestic terror attacks point up the importance of federal agencies alerting local police to threats.

- veryone in Nick Selby is a Dallas-area police detective who runs a North Texas police intelligen­ce sharing group. He is co-author of “Cyber Attack Survival Manual.” By Nick Selby

Ethe security world is worried about leaking. Last week, for instance, the U.K. government excoriated U.S. officials for leaking sensitive informatio­n about the Manchester terrorist attack. Americans, the British say, cannot keep secrets. In the context of domestic terrorism, however, the real crisis isn’t what we leak — it’s what we don’t share. More than 15 years after the Sept. 11 attacks, federal agencies are somewhat more willing to share informatio­n with one another, but they still hold back when it comes to local law enforcemen­t.

To cite one example: In 2015, federal officials chose not to warn police in Garland, Texas, that known terrorism suspects were in the area before those suspects, inspired by Islamic State propaganda, opened fire outside a prophet Muhammad cartoon contest. Federal officials also chose not to disseminat­e informatio­n about Tamerlan Tsarnaev, one of the 2013 Boston Marathon bombers the FBI had looked at repeatedly.

Intelligen­ce sharing is hard, for some not-so-obvious reasons. Collaborat­ion requires that agencies understand one another’s profession­al culture and their own limitation­s. What is shared must convey actionable informatio­n without betraying the sources and methods used to glean that informatio­n, because doing so could endanger operations and even lives. This is a tough line to walk.

Moreover, most agencies don’t want to share intelligen­ce that isn’t rock solid — even though widening the circle of trust could help fill in the gaps. All too often, there’s a bias toward hoarding that’s both cultural and legal: There’s no penalty for not sharing, but there are stiff penalties for sharing what you shouldn’t have.

Intelligen­ce leaks and unnecessar­y non-collaborat­ion arguably have the same root cause: the desire to feel important.

When people see classified informatio­n, they know they are among an elite few.

Some leakers are politicall­y or financiall­y motivated, but often they just want other people to know that they have access to sensitive data. Leakers share details they convince themselves won’t be damaging, in exchange for an ego boost.

Similarly, people who keep informatio­n closer than is really necessary may feel that the more people are in the know, the less special they will seem. If a lowly local cop has access to the same data as a federal intelligen­ce officer, maybe it’s not so valuable.

Of course most of what local cops do has nothing to do with terrorism. Police department­s use their limited resources to combat everyday crime; they won’t send officers to patrol a controvers­ial art show unless they have good reason to believe that’s necessary.

That’s why it’s so important for national intelligen­ce agencies to keep police department­s in the loop about specific threats.

Proactive police leaders, however, are doing what they can to improve matters at the local level, creating interdepar­tmental intelligen­ce and sharing capabiliti­es that sidestep the federal system. They are using relatively simple communicat­ion platforms — often email and file sharing — on which groups of trusted individual­s discuss intelligen­ce and common challenges.

Some sharing networks are run by large department­s. Others, like one that connects nearly 1,000 investigat­ors, analysts and agents from more than 120 North Texas agencies, are run by individual officers. They tend to share publicly available and unclassifi­ed — but highly valuable — informatio­n.

These groups help build relationsh­ips among trusted members, so that if there’s specific intelligen­ce available about an imminent threat, breakout groups — small trusted circles — form quickly and naturally.

A “threat” might mean a minor but multi-jurisdicti­onal crime, like a burglary series hitting several towns. For example, recently a Texas detective posted about bulk thefts of baby formula. Within an hour, a detective from another agency about 20 miles away responded with the name of a suspect he had in custody for the same thing. As it turned out, the first detective’s thefts had been committed by the second detective’s prisoner. Until recently, that kind of interagenc­y collaborat­ion was difficult.

These same groups also post informatio­n about terrorist threats — not necessaril­y with the goal of stopping a specific action, but for the sake of better understand­ing how local officers might recognize pre-attack indicators, among other more general issues. A post might be a link to an academic paper, like one on terrorist network communicat­ion strategies. Or an unclassifi­ed paper on plot recognitio­n, or domestic violent extremism, or case studies of recent terrorist attacks.

While the news media were publishing Manchester-related leaks last week, local police were sharing unclassifi­ed but critical analyses of how the attack was probably carried out, and the implicatio­ns for those seeking to protect the public.

It would be helpful if national intelligen­ce agencies were involved in such conversati­ons, because they can see some attacks coming well before local department­s can.

Intelligen­ce is a process, not just a product. When intelligen­ce is not shared appropriat­ely, the process breaks. That’s a bigger problem than leaks.

Newspapers in English

Newspapers from United States