recommended reading

Intelligence Community Backs Off Information Sharing


A recent solicitation issued by the Defense Intelligence Agency suggests the intelligence community has started to back away from developing a common technology architecture to foster information sharing -- a concept officials touted in February prior to revelations that National Security Agency contractor Edward Snowden was leaking top secret information to the press.

The Intelligence and National Security Alliance, a government and industry group, released a white paper on Feb. 11 based on input for development of a new intelligence community IT environment based on input from the chief information officers of the 16 intelligence agencies. It emphasized a common environment to enhance information sharing.

The paper, titled “Doing in Common What is Commonly Done,” said the intelligence community has  embarked on “a significant IT transformation . . . [which] focuses on enabling greater integration, information sharing, and information safeguarding through a common IC IT approach that proposes to improve mission and business processes, and substantially reduce costs.”

The paper quoted Neill Tipton, director of information sharing for the undersecretary of Defense for intelligence, who bemoaned the lack of common systems, a situation that made it difficult to share critical information in a combat environment. “You sit at a headquarters and you’ve got NSA guys on their NSA net, the NGA guys on the NGA net, the CIA’s on its own network. They’re all doing the same mission, supporting the same commander and working at the same objectives. But their idea of sharing data is sending emails to each other across their different networks. When we can roll into a theater of operations and bring in a single network to provide intel support to that theater, that will be success.”

The grand information sharing vision seems to have taken a back seat to security in the wake of the leaks by Snowden, which started in May and continue today. The Defense Intelligence Agency, in a request for information to industry released July 8, said the intelligence community plans to develop a common desktop environment that will support the use of shared services, such as VoIP phone calls and video. But the solicitation notes that DIA also is exploring an alternative, known as a desktop services model, that “allows agency users to remain in their native agency system domain and reach out to an IC DTE domain to gain access to common services.”

Steven Aftergood, director for the government secrecy project at the Federation of American Scientists, said this “implies reduced information sharing.”

Bernie Skoch, a retired Air Force brigadier general with extensive security experience, said, “Recent high profile cases of apparent human intelligence compromise will significantly shape any information sharing acquisitions for a very long time. Industry today can deliver a perfectly secure system, but it would be useless in sharing information. Or they can deliver the ideal information sharing platform, but it would likely be less than perfectly secure.  So the challenge continues to be finding the balance between information access and security, and I have yet to see a system that does both perfectly.”

The February white paper said the Office of the Director of National Intelligence plans to reduce the budgets of intelligence agencies over the next decade, and “leaders expect to reap a significant portion of their savings in information technology efficiencies.”

The white paper estimated that IT accounts for 25 percent -- $13 billion -- of the requested budget of $52.2 billion for the National Intelligence Program in 2014.

Aftergood said that the intelligence community will not realize the savings it anticipates from a common IT environment if the intelligence agencies embrace the option of continuing to operate in their own domains.

Skoch said the biggest challenge the intelligence community faces in development of a common environment also goes back to funding. “The program office absolutely must demonstrate that the solution it is pursuing will not only meet the requirements of the IC as a whole, but that it will respect the equities of all the players and at the same time deliver best value for their shrinking resource slices,” Skoch said.

“That won't be easy,” he said. “And if they fail, you can bet the operational necessities of the individual agencies will trump any call for an enterprise transformative strategy.”

(Image via wavebreakmedia/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.