Computerworld - PHILADELPHIA -- They may not be the Continental Congress, but hundreds of IT experts from the defense and intelligence communities gathered here yesterday to share ideas and plans on emergency responses to a terrorist attack on the nation.
Only blocks from the spot where the Founding Fathers signed the Declaration of Independence, more than 900 government and private-sector officials met to discuss efforts to improve collaboration and information sharing among the hundreds of federal, state and local agencies in charge of emergency response in the event of future terrorist attacks.
On the first day of the three-day Information Sharing and Homeland Security conference, officials have been clear on what the overall strategy is for detecting and preventing future attacks: Create a nationwide information-sharing architecture by leveraging the billions of dollars in federal IT investments, rather than building something from scratch.
"We're trying to use the existing capabilities of the [intelligence] community," said Bill Dawson, a deputy intelligence community CIO for the office that advises the director of central intelligence on IT policy.
In particular, Dawson was referring to an IT project begun before the Sept. 11 attacks that has acquired a new sense of momentum. The system, known as the Intelligence Community System for Information Sharing (ICSIS), provides controlled and secure gateway interfaces between networks with different security controls and classification levels.
For example, ICSIS, which is still in the first phase of development, will enable analysts to share sanitized versions of top-secret intelligence reports with other analysts and possibly state and local officials who might have only a secret-level security clearance, said Dawson. The system will automatically remove information pertaining to sources and methods of intelligence collection, thereby downgrading the security classification of the documents, said Dawson.
Phase one "enablers" under development include a public-key infrastructure; a full-service directory for identifying experts and analysts throughout the 14 different agencies that comprise the intelligence community; a collaborative tool suite; additional trusted and controlled interfaces between agency-specific communities of interest; and metadata and interoperability standards to support data discovery throughout the intelligence community.
"What we're really doing is going beyond the baseline we have now with Intelink," said Dolly Greenwood, director of architecture at ICSIS, referring to the widely used classified intelligence community intranet.
Since its inception in 1994, Intelink has grown to the point where it isn't always effective, said Stephen Selwyn, director of knowledge management at the Intelligence Community CIO Office. "Searching Intelink is like shooting craps," he said, referring to the 2.4 million Web pages that now populate the classified intranet.
"We're trying to enable analysts to
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts