IT Hurdles Complicate Intelligence Overhaul
Technology blueprint, better integration needed to support melding of agencies
Computerworld - Approximately one year after the formation of the Department of Homeland Security - which was the largest reorganization of the federal government in 50 years -- the U.S. intelligence community is facing a similar overhaul that some fear could threaten the meager progress made so far on information sharing and IT integration.
The recently released 9/11 Commission Report outlines a stinging indictment of the government's information-sharing efforts and calls for the appointment of a national intelligence director with full budgetary authority over the country's 15 intelligence agencies and departments. A series of congressional hearings last week focused on the long-term impact that major organizational changes might have.
In conjunction with the possible creation of a Cabinet-level intelligence director's post, the Bush administration is preparing to establish a National Counter Terrorism Center, which could incorporate the CIA's Terrorist Threat Integration Center and other personnel from that agency. But questions about lines of authority, IT systems integration and a host of other issues have TTIC Director John Brennan concerned.
Any information-sharing system must be "based on a clear understanding of who is responsible for what," Brennan told members of the House Select Committee on Homeland Security. There also has to be an overall blueprint for IT investments, including strategic prioritization, interoperable hardware and software, and role-based data access, Brennan said.
Even without the confusion that might arise from organizational changes, homeland security and intelligence agencies are struggling to overcome IT problems, Brennan added. The issues he cited include "a plethora of legacy information systems and networks ... [that] impede interoperability."
Patrick Hughes, assistant secretary for information analysis at the DHS
Image Credit: Dan Verton
Some members of Congress also fear that the proposed changes might complicate the DHS's ongoing effort to connect state and local officials to the new Homeland Security Information Network.
Two weeks ago, the DHS hosted a gathering of more than 300 state and local officials in Washington to train them to handle classified federal information that will be made available on the network, said Patrick Hughes, assistant secretary for information analysis at the DHS. The network is currently being deployed and should be fully in place by year's end, he added.
Even so, "I don't think we have licked the problem of complete coordination between the federal government and with the state and local government and private-sector customers forfinished intelligence," said committee chairman Rep. Christopher Cox (R-Calif.).
At the FBI, there is still a basic need for secure communications, said Maureen Baginski, the agency's executive assistant director for intelligence. "Our biggest need is secure communications to our field offices and for secure [communications facilities]," she said. "In order to join this large intelligence community and be a healthy node on this network, we have to be able to operate in the environment."
Read more about Business Intelligence/Analytics in Computerworld's Business Intelligence/Analytics Topic Center.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts