Imagine a detective working a fraud investigation. As a result of a single inquiry into a networked system-connected to local, state, regional, and federal databases-responses are received from the Federal Bureau of Investigation and a state law enforcement agency that the subject is also believed to be part of a major money laundering operation that may be supplying several terrorist organizations. The detective then contacts the intelligence analyst listed as the point of contact in the networked system, who provides a comprehensive briefing document that explains how the detective’s fraud investigation fits into the big picture.