Intelligence

October 1, 2013
By Mark M. Lowenthal

Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), once observed that one of the peculiar behaviors of the intelligence community is to erect totem poles to the latest fad, dance around them until exhaustion sets in, and then congratulate oneself on a job well done.
 

October 1, 2013
By Lewis Shepherd

What do modern intelligence agencies run on? They are internal combustion engines burning pipelines of data, and the more fuel they burn the better their mileage. Analysts and decision makers are the drivers of these vast engines; but to keep them from hoofing it, we need big data.
 
The intelligence community necessarily has been a pioneer in big data since inception, as both were conceived during the decade after World War II. The intelligence community and big data science always have been intertwined because of their shared goal: producing and refining information describing the world around us, for important and utilitarian purposes.

October 1, 2013
By Robert K. Ackerman

A transliteration tool developed jointly by the intelligence community and a commercial firm is helping eliminate the problem of misidentified foreign names and places in databases. These types of errors can allow a potential terrorist or plot to slip though security if analysts cannot identify common proper nouns and establish valuable links.

October 1, 2013
 

Another Overhyped Fad

By Mark M. Lowenthal

Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), once observed that one of the peculiar behaviors of the intelligence community is to erect totem poles to the latest fad, dance around them until exhaustion sets in, and then congratulate oneself on a job well done.

October 1, 2013
By George I. Seffers
Recent insider leaks have added fuel to the fire for cloud computing critics, but National Security Agency officials remain committed to their approach for delivering an enterprise-wide architecture to the entire intelligence community.

Recent insider security breaches have put increased scrutiny on the U.S. intelligence community’s cloud computing plans. But cloud computing initiatives remain unchanged as the technology is expected to enhance cybersecurity and provide analysts with easier ways to do their jobs in less time.

October 1, 2013
By Henry S. Kenyon
The Intelligence Community Information Technology Enterprise (ICITE) will connect the nation’s intelligence agencies, such as the NSA and CIA into a single information sharing environment. When ICITE is complete, NSA and CIA analysts will be able to collaborate with each other in a shared cloud environment.

U.S. intelligence agencies soon will be able to share information with each other in a single common computing environment. This effort will increase intra-agency cooperation and efficiency while cutting information technology operating costs through the use of shared services.

The Intelligence Community Information Technology Enterprise (ICITE) is part of a broad strategy led by the Office of the Director of National Intelligence (ODNI) and supported by the chief information officers (CIOs) of the five major intelligence agencies. ICITE replaces the old agency-based information technology model with one using a common architecture operating as a single enterprise across the intelligence community.

October 1, 2013
By Robert K. Ackerman
The U.S. National Security Agency’s (NSA’s) National Security Operations Center (NSOC) serves as the heart of the NSA’s signals intelligence reporting. The part of signals intelligence that covers social media may spin off into its own discipline as intelligence experts refocus their means of collection and analysis of the unique data it can provide.

The Arab Spring, which rose from street-level dissent to form a mass movement, might not have come as a surprise to intelligence agencies if only they had been able to read the tea leaves of social media. The characteristics of social media that differentiate it from other messaging media are compelling intelligence officials to change the way they derive valuable information from it. As a result, experts are calling for the creation of a new discipline that represents a separate branch of intelligence activity.

September 9, 2013
By Robert K. Ackerman

The first step toward an enterprisewide information environment is taking place on desktops belonging to personnel with the National Geospatial-Intelligence Agency (NGA) and the Defense Intelligence Agency (DIA). Deployment has begun for the Intelligence Community Information Technology Enterprise, or ICITE, which aims to provide a common computing environment based on cloud technology (see SIGNAL Magazine articles Managing Change in the
 Intelligence Community and Intelligence CIOs Teaming for Change from October 2012).

September 1, 2013
By Kent R. Schneider

Do you ever find yourself trying to reconcile with your environment? That is where I am now with regard to national security and reaction to leaks and programs designed to protect against terrorist threats.

In 2010, Julian Assange and his WikiLeaks organization got themselves on the world stage by publishing large volumes of classified documents, many provided by Pfc. Bradley Manning, USA, an intelligence analyst. At that time, and since, both Assange and Manning have been held up as villains by some and as heroes and whistle-blowers by others.

September 6, 2013
George I. Seffers

Officials at Auburn University, Auburn, Alabama, are developing a program that allows students from any academic discipline to work closely with the U.S. intelligence community in a variety of actual national security-related problems. The university is on track to begin offering a minor in intelligence analysis in the relatively near future and a major in the next five years.

September 1, 2013
By Rita Boland

 

The exponential expansion of geolocation technology throughout all levels of society is presenting a range of challenges for policy makers eager to take advantage of the benefits while protecting personal privacy. Unfortunately, much of the discussion surrounding the challenges is fragmented or lacking in authority.

July 31, 2013
By Robert K. Ackerman
Eugene Kaspersky, chief executive officer and co-founder of Kaspersky Lab, runs through the cyber threat spectrum and offers some solutions.

AFCEA Global Intelligence Forum Online Show Daily, Day 2

Quote of the Day:

“Whether it is national security information for the president, or financial information for a chief executive, when you don’t know whether the data is true or false, it’s a really bad day.”—Sean Kanuck, national intelligence officer for cyber at the National Intelligence Council in the Office of the Director of National Intelligence

July 30, 2013
By Robert K. Ackerman
U.S. Representative Mac Thornberry (R-TX) calls for government and industry to work together on cybersecurity at the AFCEA Global Intelligence Forum in Washington, D.C.
AFCEA Global Intelligence Forum Online Show Daily, Day 1

Quote of the Day:

“The more we can talk about cyber and intelligence in the open, the better we will be … the less the demagogues can take it and run with it.”—U.S. Representative Mac Thornberry (R-TX)

Intelligence needs cyber, and cyber needs intelligence. How they can function symbiotically is a less clear-cut issue, with challenges ranging from training to legal policy looming as government officials try to respond to a burgeoning cyber threat.

July 1, 2013
By George I. Seffers
 The National Security Agency is wrapping up the Fishbowl pilot program, which distributed 100 Android devices to users. The program now transitions to the Defense Information Systems Agency.

Project Fishbowl spurs industry to
 meet military
 and intelligence 
community needs.

U.S. intelligence and defense officials are wrapping up a mobile device pilot program known as the Fishbowl project and are planning over the next year to expand on the capabilities it provides. Doing so is part of a larger strategy to wean the agency and the Defense Department off of government-designed mobile device technology, which will save time and money while providing secure, cutting-edge electronics for high-level government officials and to individual soldiers.

May 22, 2013
By Robert K. Ackerman

The U.S. intelligence community will be relying to a greater degree on commercial technologies to meet its current and future requirements, including some that formerly were the purview of government laboratories. And, because much of the community’s research is applied research, it will select its budgeting priorities based in part on how well the commercial sector can fill in some technology gaps on its own.

April 19, 2013
By Robert K. Ackerman

Free World intelligence communities are confronting a more difficult world in which dramatic changes are altering the geopolitical landscape faster than previously experienced. Both technology and human factors play a role in this dynamic realm, and both technological and human solutions will be necessary for the intelligence community to adjust accordingly.

April 1, 2013
By Capt. D. Mark Houff, USN

The past may provide a guidelines to the future.

March 26, 2013
By Max Cacas

The Defense Information Systems Agency (DISA) has begun internal discussions regarding a multiaward contract for cloud computing services.

Anthony Montemarano, DISA’s director of strategic planning and information, told a briefing of industry leaders Monday that he and his agency are firm believers in cloud computing. “When you look at some of the functions that we perform in government, a lot of it can be provided in the commercial cloud. We have to come to grips with the value proposition,” he explains. He believes that the Defense Department’s cloud computing strategy must include DISA cloud resources, commercial cloud services and privately owned cloud services where appropriate.

March 1, 2013
By Rita Boland
Artist’s rendering of the Enhanced Medium Altitude Reconnaissance and Surveillance System scheduled for fielding to the U.S. Army in 2014. The system will provide enhanced connectivity to the Distributed Common Ground System-Army, the service branch’s premier intelligence enterprise.

The plug-and-play technology will close large capability gaps in the field.

The U.S. Army is developing the first airborne intelligence, surveillance and reconnaissance platform fully enabled to connect analysts with the Distributed Common Ground System-Army. That system will help remedy problems currently hindering soldiers from having all data feed into a single repository. With the new aircraft, the process will be streamlined from the flying support, so information reaches ground commanders faster to facilitate more timely decision making.

March 1, 2013
by Kent R. Schneider

Anyone who has attended an AFCEA conference in the past two months has heard the constant drumbeat from senior government leadership on the limitations on operations and readiness likely to occur in defense, intelligence and homeland security. At the AFCEA/USNI West 2013 Conference in San Diego January 29-31, the vice chairman of the Joint Chiefs of Staff told a packed audience that the U.S. Defense Department did not know how much money it would receive, when it would receive it or what the restrictions on its use would be.

Pages