The Truth About Fusion Centers

Fusion centers are popping up in local jurisdictions across the country. And the private sector holds major stakes in the success or decline of an implementation. Wednesday’s ASIS show featured the educational session, “Private Sector’s Role in State and Regional Intelligence Fusion Centers.”

The session was led by Bonnie Michelman, CPP, director of police, security and outside services for Massachusetts General Hospital, and by Daniel Rattner, DM, an industry veteran for more than 30 years and principal of Rattner & Associates.

The mission of a fusion center is to provide timely, accurate and reliable information across public agencies in an effort to prevent terrorism and other criminal activity. Today, more than 43 fusion centers have been established across the country. The fusion centers are managed primarily by law enforcement personnel, but are of critical importance to the private sector as both a source and consumer of information. Moreover, 85 percent of critical infrastructures are owned and secured by the private sector.

“Without the private sector, we have no way to protect the country,” Michelman said. “The private sector has unbelievable growth.”

Truth be told, fusion centers cannot be possible without the help of the private sector. But even with the help of both private and public entities, there are a number of issues that arise. Challenges include a lack of knowledge from key players, a change in players at the table, historical stereotypes and division and organizational buy-in. Even a greater challenge is the ability to actually share the needed information with the appropriate sources, specifically that information which is classified. Though those are issued faced by the public sector, the private sector’s role in a fusion center is clear.

“The private sector’s role is to act as the source of vulnerability information,” Rattner said.

The private sector is asked to communicate anything that may be deemed as unnatural behavior. The next terrorist can walk through your company’s doors and give clear clues to their intentions, but remain largely unrecognized.

“In the 80s, terrorism was political. Now it’s economical,” Rattner said.

With the increase in wealth of private infrastructures, terrorists are targeting those entities which can cause the most havoc if disrupted. So fusion centers hope to create clear lines of communication between the private and public sector. Nonetheless, the closing of the session was left open ended. The question remains: Are they really working?

About the Author

Karina Sanchez is the former managing editor for Security Products magazine. She now freelances for Web publishers, trade magazines and corporations.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.