Sharing intelligence is a complex topic, as you know from the readings. Leaks are another weakness in security of information. However, the leaks of sensitive State Department cables was due in large part to procedures at the State Department that gave unwitting access to pretty much anyone with the clearance level. Read Joby Warrick’s Dec 31, 2010 article entitled “Cables Leak Reveals Flaw of Information-Sharing Tool”.
Then consider the new IC ITE architecture which is designed to enable broad usage with common workstations and secure cloud storage. Please discuss the problems at the State Department (consider them in context of the times) and how things got fouled up. Then consider and discuss the procedures designed to protect access to information in the new “enterprise” solution of IC ITE. Read about it here.