The system aims to aid checks for 4 million federal positions that require some clearance.
Data inconsistency or data consistency indigestion!
How to understand the NSA’s June 28 announcement about its call-detail record databases.
Source: The NSA and the USA Freedom Act
Nice and it can also have other benefits related to technology life cycle management, procurement, costs reductions, transformation and EA. The system can also be an Achilles heel. But then working with EINSTEIN would make them smarter and they can fight back at the speed of light … go E3A!
So far, 20 of 23 major agencies are plugged into the dashboard. The last three should be on by the end of July.
Because Susan Landau is a true Architect, Ray Ozzie never was.
Ray Ozzie’s proposal for exceptional access has the virtue of being simple. But security can be subtle, and simple solutions often miss critical aspects. This one has.
If the U.S. is serious about bringing a greater capability to bear on the adversary, how can the military plan and manage across domains?
The National Academies’ report on “Decrypting the Encryption Debate” says some computer-security experts have ideas for implementing secure exceptional access to encrypted systems—but that’s a far cry from saying they’re “trying to build” them.
In a world where knowledge increasingly matters more than physical power, US troops can’t quickly access vital information in a labyrinth of often incompatible and inaccessible databases. The Joint Enterprise Defense Infrastructure — archly acronymized as JEDI — aims to fix all that.
“Philosophy”, stoplight charts? 90% of IC programs hit green … fudging … no! Like any one is going to put #2 in orange or red. And conspiracy theorists think there are a bunch of gong ho sneaky spies running around (the water cooler) McGuyvering stuff. And that screen projection makes no sense.
INSA HQ: Drive milestone decision authority down as low as is possible. Speed decision-making. Let the Intelligence Community agencies create simple and clear requirements and manage their programs, as long as everything goes along swimmingly.
Very nice thought through paper. The challenge is in the details and implementation. Practically impossible to arrive at common baseline standards, implement and monitor/ensure compliance and change.
A new paper from New America introduces a novel framework for data flow controls.
“How can traditional open source intelligence professionals compete in what is quickly becoming an environment in which non-intelligence individuals and organizations, with quite different motivations and objectives, are also participating? More importantly, what does this mean for U.S. intelligence community’s ability to maintain strategic advantage in the open source world?”
As a former Information Architecture practitioner I see this as more of the first question career advice than the second one about strategic advantage.
Like most industries, the value added will be moved up the value chain from raw collection to making sense of more data with more noise — which she talks about — but a good deal of the stuff will AI’d soon and, finding/sorting-skills and tools will become services rather than internal silos. Kiss that career and turf goodbye either way.
What does strategic advantage in the open source world mean? Open source rarely, if at all, gives away a well kept mosaic let alone interrelated ones needed to be understood side by side with other analysis in specific contexts that change over time.
Technological advancements in the past 30 years have in many ways democratized access to information and disrupted countless industries – from journalism to national security. Increasingly, intelligence-rich assessments are being made by non-intelligence professionals.