Browse: Home / 2011 / March / 02 / Leveraging the Cloud for the Intelligence Community
November 13, 2021
Header image

GovCon ExecLogo

Private-Public Connections for Contract Leadership

Menu

Skip to content
  • Home
  • About
  • Wash 100
  • Advertise
  • Posts from ExecutiveBiz for 01/04/2019
  • Posts from GovConWire for 01/04/2019
  • Posts from GovConDaily for 01/03/2019
  • Posts from ExecutiveBiz for 01/03/2019
  • Posts from GovConDaily for 01/02/2019
  • Posts from GovConWire for 01/03/2019
  • Posts from ExecutiveBiz for 01/02/2019
  • Posts from GovConWire for 01/02/2019
  • Posts from GovConDaily for 12/28/2018
  • Posts from ExecutiveBiz for 12/28/2018

Leveraging the Cloud for the Intelligence Community

Posted by govconexec-admin on March 2, 2011 in Features | 62 Views

For the better part of the last decade — specifically in the wake of 9/11, the Intelligence Community has been looking to pin down a better process for information sharing across its 17 agencies.

While the discussion of how to best tear down the outdated constructs that isolate crucial information and hinder agencies from acting on the best intelligence has continued since the minute the 9/11 Commission Report was released, few practical solutions have been identified.

Nearly three years ago, the Office of the Director of National Intelligence issued a plan to deal with the removal of the barriers that stand in the way of an optimally functional IC.

“Improving information sharing will bring about true all-source analysis and deliver timely, objective and actionable intelligence to our senior decision makers, warfighters and defenders of the homeland,” then-Director of National Intelligence Mike McConnell said of the 20-page document.

With the rise of cloud computing in the federal government, the answer for the IC could at last be within reach.

GTEC President and CEO John Hillen, former assistant secretary of state for political-military affairs, notes the cloud would allow agencies to better access and share information.

Rather than have each agency store and access its own data, the IC could exchange data over the cloud.

Hillen pointed out the advantages of cloud computing to the IC, saying it can be very scalable and offer virtualized resources to its users.

“[The current system] has cost, data sharing, scalability, redundancy and even some performance advantages,” he added. “In theory, a cloud architecture offers the smaller and mid-sized agencies of the IC the potential computing power of the entire IC as whole.”

Hillen warns, however, that the cloud should not been seen as any type of magical elixir for the IC, pointing out the amount of policy and security ground to cover before that sort of theoretical model could or would be put into place.

“Cloud computing really should be seen as just an architecture,” he said, “one that has its advantages and disadvantages like any technological architecture. It has been sold a little too often as an inevitable future for all network architecture, or as a solution to all network architecture problems, but it is just an architecture.”

One potential drawback of the cloud is the generally accepted idea that an IC cloud would be difficult, or perhaps even impossible, to secure.

Not so, according to Hillen. Some observers, he noted, have said the shared architecture model of the cloud makes it automatically less secure. However, various security measures exist that can make a cloud architecture as secure as closed, physically secured, and locally owned architectures.

Virtual or cloud environments do not necessarily provide any user more levels of access than closed and owned architectures, Hillen said.

“Context aware access controls and policies, access control lists and auditing, varieties of encryption, and good information rights management policies and technologies can make a cloud architecture as or more secure than a completely user-owned architecture,” he explained.

Dispelling other misconceptions of cloud security, Hillen noted the internal threat — that is, the potential ease an internal subvert could have in stealing information from a cloud database.

Hillen said the technology is ultimately a nonissue, and the internal threat is essentially reduced to a policy problem. Specifically, the question is raised: Why were certain individuals granted such broad access in the first place?

In the WikiLeaks case, the State Department seemingly lost control of who had access to its data when shared within the SIPRnet — in this case, sensitive diplomatic reporting cables, Hillen said.

“The data was on the SIPRnet in the first place because the State Department was broadly and properly implementing a communitywide policy priority to share data across agencies,” he said.

“But satisfying that broad policy directive certainly shouldn’t mean that a low-ranking Army analyst should automatically have access to very sensitive reporting cables of all kinds, as was reported in the WikiLeaks case,” he added.

However, ultimately, the issue comes down to people.

“Any architecture — cloud or not — will be as secure as the policies and people are within it,” Hillen said. “Technology exists now to make all these architectures secure.”

With a fair picture of the issues posed by cloud computing in the IC coming into focus, it is also important to note the positives the technology brings to the table.

J.R. Reagan, a principal at Deloitte, who, like other experts, warned about the security aspects of the cloud, still acknowledged the sharing abilities the IC would gain.

“Cloud computing changes the status quo for the Intelligence Community and offers disruptive opportunities to modernize Intelligence Community systems,” he said. “This will allow agencies to share information as needed. It could also result in faster deployment of common services and software, reusable architecture and better data access.”

Reagan’s colleague at Deloitte, principal Tim Chase, honed in on the “very real” opportunities for the IC to improve efficiency while cutting costs. He also pointed to the business opportunities awaiting government contractors.

“The impact on industry stands to be significant also, not just in terms of the opportunities created to help the government set up and transition to the cloud,” he said, “but also in terms of how future intelligence solutions can be architected and implemented.”

When distilling those positives down to a bottom line, the message becomes clear to NJVC engineering fellow and cloud-computing lead Kevin Jackson.

“The key value of cloud computing to the IC is in speed and range of access to information technology resources,” he said. “Cloud computing provides resource agility which, in turn, will result in responsive mission accomplishment. I personally believe this agility would also result in lives saved.”

Posted in Features | Tagged 9/11, Cloud architecture, Cloud Computing, cybersecurity, Deloitte, DNI, government contractors, GTEC, information sharing, Insider threat, Intelligence Community, intelligence solutions, internal threat, John Hillen, JR Reagan, Kevin Jackson, Mike McConnell, national security, network architecture, NJVC, odni, Office of the Director of National Intelligence, SIRPnet, Tim Chase, WikiLeaks

About the Author

govconexec-admin

Related Posts

Mark Testoni, President and CEO of SAP NS2, Selected to 2018 Wash100 for Exceptional Achievement in Providing Secure IT Infrastructure and Cyber Solutions→

Mark Johnson, Oracle Public Sector SVP, Inducted Into 2018 Wash100 for His Leadership in Driving Federal Cloud Adoption→

Phebe Novakovic, Chairwoman and CEO of General Dynamics, Added to 2018 Wash100 for Fiscal Growth and Acquisition Leadership→

Lt. Gen. Vincent Stewart, Cybercom Deputy Commander, Chosen to 2018 Wash100 for Cyber Defense Leadership→

Click here to sign up for all of our E-NewsWires

Subscribe to all our E-NewsWires

Subscriber Details

Upcoming POC Event

Sponsor Ad

©2015 GovCon Exec

Menu

  • Authors
  • Sitemap
  • Contact Us
Show Buttons
Hide Buttons