Computerworld - The largest, most secretive arm of the U.S. intelligence community this week took a major step toward upgrading its IT infrastructure in a way that may bolster its ability to thwart future terrorist attacks.
The National Security Agency (NSA), the signals intelligence and eavesdropping arm of the Pentagon, signed a $282 million contract with San Diego-based Science Applications International Corp. (SIAC) that's designed to help the agency sift through and make sense of the torrent of data it collects from cell phone conversations, faxes, e-mails and a wide variety of other electronic communications around the world.
The contract is part of what's known as the "Trailblazer" program, which has been in the works for two years. However, the award to SAIC "marks a significant shift in the Trailblazer program from a planning to a development activity," said Lisaanne Davis, an NSA spokeswoman. Davis declined to comment on the specific types of commercial IT products that would be purchased and integrated.
SAIC deferred all comments on the contract to the NSA.
However, a former senior NSA executive responsible for the agency's first moves into the commercial IT world said SAIC will "be the glue that allows NSA to use all of the different commercial tools."
Many of those tools, such as advanced data mining applications, will enable analysts to "reach down into the pile and pull the most important things to the top," said the former official, who spoke to Computerworld on condition of anonymity.
And missed signals seem to be the driving force behind the program. For example, hidden among the millions of communications intercepts the NSA collected on Sept. 10, 2001, were two Arabic-language messages warning of a major event the next day. The NSA analysts didn't translate the messages until Sept. 12.
"NSA has been behind the curve in a number of IT areas, so the agency might benefit from many kinds of readily available applications involving database management, data mining techniques and virtual networking," said Steven Aftergood, a defense and intelligence analyst at the Federation of American Scientists in Washington. "There is a broad consensus that the agency's future depends on a vigorous modernization initiative."
Richard Hunter, an analyst at Stamford, Conn.-based Gartner Inc. and a former NSA analyst, said knowledge management systems, such as data mining and collaboration tools, would likely be of the most benefit to NSA at present.
"Robust examples of such systems can be found in any large consulting company, where they're used to managing the huge volumes of intellectual capital developed on engagements," said Hunter. "In short, they're about managing intellectualcapital, experts and expertise, all of which are critical to NSA's mission."
But IT alone may not be enough, according to the former NSA official. "The real answer is technology and people," the official said. "Work has to be organized, principles have to be established and people have to be held to those principles. No amount of technology can make up for that."
Read more about Gov't Legislation/Regulation in Computerworld's Gov't Legislation/Regulation Topic Center.
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- IDC ranks IBM #1 in market share for enterprise social software IDC ranks IBM #1 in worldwide market share for 3 consecutive years. IDC also shares its Social Software 2013 - 2017 market forecast....
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...