Reason To Share - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Software // Information Management
09:52 AM

Reason To Share

Despite political infighting, intelligence agencies are working to improve collaboration and data sharing.

Politics and pride have for decades kept the U.S. intelligence community from communicating effectively within and across divisions. They may still, as the bill to create a national intelligence director who would oversee the government's spy agencies and their budgets now is stalled in Congress over some members' concerns that it would undermine the Pentagon's authority on intelligence issues. President Bush says he's determined to revive the bill, which was spurred on by the 9/11 Commission's July report exposing the intelligence failures that contributed to the success of the terrorist attacks.

Technology solutions to the problem are so much simpler than the rough-and-tumble of Washington politics. The networking and security technology to improve intra- and interagency data sharing has existed for years, IT managers in the intelligence community say. Acknowledging that the risks of not sharing data are greater than the potential security risks of connecting networks, some of them are moving forward with IT efforts, even in the absence of a clear mandate.

"There's always a balance between security and sharing, and the intelligence community has generally fallen on the side of security in the past," says Ryan Durante of the Department of Defense Intelligence Information System IT staff. That mind-set has been changing, he says. As program manager of the Trusted Workstation initiative, Durante and his team of IT professionals at the U.S. Air Force Research Library, which manages the Intelligence Information System IT infrastructure, are deploying a system to make it easier for Defense Department intelligence analysts to view data across multiple classified and unclassified networks from a single desktop and share that information appropriately.

U.S. Air Force Research Library is working with Trusted Computer Solutions Inc., a provider of secure data-sharing software, and Sun Microsystems, which is providing its diskless Sun Ray desktops and Solaris Common Desktop Environment to act as the user interface. Led by CIO Michael Pflueger, Intelligence Information System is deploying a fleet of desktops that lets analysts view data from as many as 13 separate networks from a single desktop on a single screen, and even drag and drop documents and data from one network to another. Previously, analysts had to log on to separate systems to access each network. The U.S. Air Force Research Library had never been able to convince security-conscious policy makers that the new setup could be implemented without compromising security, but that changed in the wake of the 9/11 Commission's report. "The big push coming out of 9/11 was information sharing," Durante says.

Now analysts simply plug an identification card or some other type of smart card into a Sun Ray system, and they can view data from any network they're authorized to access, Durante says. Without the proper access card, user name, and password, a Sun Ray is unusable. Trusted Computer Solutions' SecureOffice Trusted Workstation thin-client software, which scans for viruses, also monitors keywords within documents and ensures that data that shouldn't be moved from one network to another isn't. The word "frequency" in a document, for example, generally indicates that a file contains sensitive communications data that mustn't be copied from its current domain. That said, even documents residing on secret, classified, and top-secret networks contain unclassified data that analysts can easily push out to other intelligence analysts and operatives as warranted, Durante says.

Additionally, SecureOffice's TCS Trusted Relabeler application enforces Defense's policy that any document must be reviewed twice before it's moved from one network domain to another. It routes documents to authorized individuals to gain their approval before a data transfer between networks takes place.

The Trusted Workstation combination of thin client and software has been deployed or is being tested at several of the Defense Department's nine Combatant Commands, including the Pacific Command, Joint Forces Command, European Command, Central Command, and Northern Command. Two others, the Strategic and Transportation commands, are scheduled to begin using the technology during the first quarter of 2005. The National Security Administration and the CIA also have expressed interest, Durante says.

The U.S. Air Force Research Library's goal is to transition 20% of its desktops, which number between 25,000 and 30,000, to its Trusted Workstation program by Sept. 30, the end of the government's fiscal 2005 year, and have 80% online by the end of fiscal year 2007.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 2
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
How CIO Roles Will Change: The Future of Work
Jessica Davis, Senior Editor, Enterprise Apps,  7/1/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
Flash Poll