NSA Pursues Intelligence-Sharing Architecture - InformationWeek
05:55 PM
Connect Directly

NSA Pursues Intelligence-Sharing Architecture

The CIO of the National Security Agency is focusing on IT architecture and a cloud-centric approach to sharing information.

NSA CIO Lonny Anderson
NSA CIO Lonny Anderson
The CIO of the National Security Agency is focusing on IT architecture and using what he calls a "cloud-centric" approach in the agency's effort to improve its information sharing with other intelligence agencies.

"Some people say we've just got to get better tools. Well, tools come and tools go," says NSA CIO Lonny Anderson, in an interview with InformationWeek at NSA's National Cryptologic Museum in Fort Meade, Md. "The key is architecture. You build an architecture, then it doesn't matter that tools come and go. There's no doubt in my mind that when we connect architectures, we'll never look back."

NSA, like other organizations within the 17-member U.S. Intelligence Community (IC), redoubled its efforts at intelligence sharing following the attempted bombing of a Northwest Airlines flight on Dec. 25, 2009. One such project, called "the Quad," is a joint initiative between NSA, the National Reconnaissance Office, the National Geospatial-Intelligence Agency, and the Defense Intelligence Agency to establish a common tech infrastructure. A first step, under way now, is the development of a role-based identity access management framework to ensure that intelligence experts are able to access the information they need, even when that information resides in another agency's database. Developers are also being trained on how to work with the new framework.

Another cross-agency effort is the Integrated Intelligence Pilot, which involves deploying new servers on the IC's classified network, the Joint Worldwide Intelligence Communications System, so developers can write apps that get shared and can run database queries across agencies. "So, instead of taking data from CIA-specific repositories, NSA-specific repositories, FBI, or DIA, you'll be able to query via the cloud into those organizations and say, 'Do you have information that meets this question?' and they'll be able to say yes or no," Anderson says.

Open Source Potential

Anderson is contemplating making some of the code developed for an intelligence cloud available as open source, similar to what NASA did with its Nebula software. "I want to take advantage of developers not just across the IC, but developers everywhere," he says. A "security wrapper" would be used to protect sensitive code.

The agency is replacing cryptologic centers in Texas, Georgia, and Hawaii that house a mish-mash of IT and communications platforms that date as far back as the 1980s. Anderson sees it as a "once in a lifetime" opportunity for IT overhaul. Beginning next year, three new cryptologic centers will house thousands of employees. The centers' new IT infrastructure will include thin clients, wireless networking, and private clouds.

"What we don't want to do is just lift and shift that legacy infrastructure and those legacy processes and ancient servers over to these brand-new facilities," Anderson says. "We're using this as a forcing function."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Moderator
4/22/2017 | 4:21:33 AM
Re: routerlogin
Thanks Nicholas, really nice article, keep posting such information :)
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll