Second National Fusion Center Conference Fosters Greater Collaboration

More than 900 federal, state and local law enforcement and homeland security officials recently attended the National Fusion Center Conference in Washington, D.C. to further the U.S. government’s plans to create a seamless network of these centers.

The second annual conference was jointly sponsored by the Office of the Director of National Intelligence, U.S. Department of Justice, U.S. Department of Homeland Security, the Federal Bureau of Investigation, the Office of the Program Manager for the Information Sharing Environment and the Global Justice Information Sharing Initiative. Participants discussed how to best incorporate fusion centers at the state level and in major urban areas into national plans to improve the sharing of information related to terrorism -- a key goal of a strategy that President Bush released last October.

After the 9/11 attacks, states and various U.S. localities established information fusion centers to coordinate the gathering, analysis, and sharing of homeland security, terrorism, and law enforcement intelligence. Today there are more than 50 operational centers in 46 states.

“Working together -- leveraging federal as well as state and local networks; moving relevant information and intelligence quickly; enabling rapid analytic and operational judgments -- that is what this network of centers is all about,” said Charles E. Allen, Homeland Security Undersecretary for Intelligence and Analysis, in his opening remarks at the conference, which was held March 18-20 at the Hilton San Francisco.

Added Russell M. Porter, Director of the Iowa State Fusion Center: “Establishing a national, integrated network of fusion centers isn't solely a federal effort.

“State, local, and tribal officials have been and will continue to be actively engaged in every step of the process,” said Porter, who also serves as Chair of the Criminal Intelligence Coordinating Committee.

Arthur M. Cummings II, Executive Assistant Director of the FBI’s National Security Branch, emphasized the importance of maintaining a unified front. Fusion centers, he said, “are an effective and efficient mechanism for exchanging information by merging data from a variety of sources to produce actionable intelligence for consumers, such as the FBI’s Joint Terrorism Task Forces and local police departments.”

Moreover, stakeholders must stay vigilant, said Bart R. Johnson, ODNI’s Director for Homeland Security and Law Enforcement Support and Outreach.

“Terrorism remains a credible and ongoing threat to our country,” he said. “The ODNI and all of the relevant federal, state, local, and tribal agencies must maintain the focus on and commitment to collaboration to mitigate this threat.”

To that end, bureaucratic turf wars would be extremely counterproductive.

“Law enforcement and justice agencies at all levels need to find ways to overcome obstacles to sharing information -- and the U.S. Justice Department is committed to providing the resources and assistance necessary to make sharing as easy as possible,” said Domingo S. Herraiz, Director of the Office of Justice Programs’ Bureau of Justice Assistance at DOJ.

On the whole, fusion centers play a decisive role, said Ambassador Thomas McNamara, Program Manager for the Information Sharing Environment.

“They are a critical part of President Bush’s National Strategy for Information Sharing,” McNamara said. “They strengthen the nation’s ability to protect communities from future attacks.”

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3