Sept. 11, 2013
Al Tarasiuk, intelligence community CIO[18:
and assistant director of national intelligence .
. the IC ITE ( Intelligence Community
Information Technology Enterprise )
is a new IT environment that will
vastly improve information sharing
across the intelligence community .
. consolidating IT across the community
was driven by budget considerations.
But today,
it's more than an efficiency play on IT:
intelligence integration,
information sharing and safeguarding .
. that translates into 3 goals:
1: effectiveness,
2: security
3: efficiency .
"In the past, these were mutually exclusive,
but now we'll have more of all 3 goals
because of cloud technologies,
and a [SOA (service-oriented architecture)]
or "service-provider-based business architecture"
providing an IC cloud not on the Internet,
but privately hosted on TS|SCI networks
(top secret / Sensitive Compartmented Information)
. high-security wide-area networks are
connected by Tesla beam transmissions,
which unlike fiber optic cable,
can be transmitted wirelessly,
and are very difficult to intercept .
. the govt denies this technology even exists,
but they've used it to communicate with submarines,
and a chinese-american collaboration is developing it .]
As part of the new IC ITE architecture,life is getting rougher on your internet:
the service providers include the big five:
-- CIA [secret combat]
and the 4 combat-support agencies
-- NSA, DIA, NGA and NRO
( National Security Agency
Defense Intelligence Agency
National Geospatial-Intelligence Agency
National Reconnaissance Office )--
. NRO provides the IC ITE's
"network requirements and engineering service" .
. rather than provision networks,
the NRO will [ integrate local area networks
with the high-security wide area network:
a secure version of the internet .]
The CIA and NSA provide the IC cloud,
which consists of the lower layers of IT
-- bare-metal hosting,
analytics as part of that hosting,
and virtual and storage capabilities.
[. before the IC ITE can be fully operational
it needs SOA's "security monitoring service",
and a "central service to monitor
end-to-end security of IC ITE".]
. having all data formatted by a single system
will remove roadblocks to cross-agency sharing;
and, automated engines will determine
whether a user can see a datum or not .
. the DIA and NGA provide the desktop,
a common software desktop
that provides the entire community with
common collaboration services, email ... .
. the ODNI [Office of Dir of Nat Intel]
declared the desktop service operational in August .
. NSA provides an applications mall
for the intelligence community,
[so that the community can readily see
which apps are already available,
as well as what needs to be done ].
. the mall came online in August .
. the initial architecture for the mall
will use the Ozone Widget Framework.
[ mandated by Section 924 of the
2012 National Defense Authorization Act .]
. the DOD will also be doing a SOA,
the JIE (Joint Information Environment)
-- a single, secure, reliable and agile
command, control, communications, and computing
enterprise information environment .
. the interconnectivity with IC ITE
still has yet to be defined,
but they do intend to have
interoperability of standards and identities,
and then some cross-domain capabilities .
. the number of malware incidents
reported by federal agencies
has increased 782% from 2006 to 2012.
and have placed sensitive information at risk,
with potentially serious impacts on
federal and military operations .
[19:
. this might include the intel community
spying on the rest of goverment .]
. the main primary vectors of malware
are the disgruntled employee,
and state-sponsored espionage or warfare .
Terrorists [or secret military/intel ]
seek to [ punish foreign policy
or create a political climate that
promotes a stronger secret military/intel .]
Terrorists [or secret military/intel ]
may use phishing schemes or spyware/malware
in order to generate funds or
gather sensitive information.
. in 2008, the DOD was cyberattacked
by a foreign intelligence agency's
infecting of a flash drive .
. it uploaded itself onto the military network,
spreading even through classified systems,
and prompted the DOD’s subsequent
Strategy for Operating in Cyberspace .
the 2008 issue of the CNCI (Comprehensive
National Cybersecurity Initiative)
introduced additional priorities for the
security of classified networks
and global supply chain risk management,
and it did not include programs to address
response, reconstitution, and recovery
or international cooperation:
1. limit points of access to the Internet
for executive branch civilian agencies.
2. EINSTEIN 2:
scan the content of Internet packets
looking for malicious code.
3. EINSTEIN 3:
create intrusion prevention system
for real-time malware prevention .
4. Coordinate and redirect R&D efforts
(classified and unclassified).
5. integration of cyber centers
6. Cyber Counterintelligence Plan:
improve the security of the physical
and electromagnetic integrity of U.S. networks.
7. secure classified networks
8. federal cyber skills training
(offensive and defensive)
9. Leap-Ahead Technology:
investing in high-risk, high-reward R&D.
10. Deterrence Strategies and Programs:
focus on reducing vulnerabilities.
11. Global Supply Chain Risk Management:
multipronged risk management.
12. “Project 12”:
new mechanisms for the fed and industry
to work together to protect the nation’s
critical infrastructure.
No comments:
Post a Comment
moderated for academic or family appeal