That's completely unrelated to cyber threat intelligence, except in situations like spear phishing, where the government (or anyone else trying to protect against attacks) might want to know what domains the attempts originated from or where the malicious links point back to.
Your linked article is completely irrelevant to this conversation. Why do you think they're related? Because the government is involved in both, and both have to do with the Internet?