A-Space

Last updated

A-Space Logo Aspace logo.png
A-Space Logo

The United States Intelligence Community A-Space, or Analytic Space, is a project started in 2007 from the Office of the Director of National Intelligence's (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the USIC. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The Defense Intelligence Agency (DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. [1] A-Space went live on the government's classified Joint Worldwide Intelligence Communications System 22 September 2008. [2] A-Space is built on Jive Software's Clearspace application (which has been superseded by Jive's Social Business Software). [3]

Contents

Analytic transformation

The Director of National Intelligence has identified A-Space as a critical piece of "Analytic Transformation": [4]

"Analytic Transformation seeks to change how we approach analysis, how we interact with our customers and each other, and is one of the principal priorities of the Director of National Intelligence. US Intelligence is engaged in a fundamental transformation of the Analysis mission at the national level."

Within the analytic transformation program, there are several initiatives under way in three areas: [4]

1) enhancing the quality of analytic products,
2) managing the mission more effectively at a Community level, and
3) building more integrated analytic operations across the Intelligence Community (IC).

For contrast, see perceived limitations of CIA information technology at CIA Information Technology.

Assumptions about improving collaboration among analysts

A-Space, according to Andrew McAfee of Harvard Business School, [5] is a means of sharing information that, in the normal course of events, might not be seen at all. He pointed out that "companies that rely heavily on innovation" spend considerable effort improving the communications among close colleagues. Mark Granovetter's insight, "The Strength of Weak Ties" (SWT) was that strong ties are not enough for the best innovative environments. [6] Strong ties between people arise from long-term, frequent, and sustained interactions; weak ties from infrequent and more casual ones. A tool such as Intellipedia or A-Space encourages collaboration among people with weak ties, complementing the traditional "team-building" and "cross-functional management" characteristic of strong ties.

"How do you transform analysis?" asked Thomas Fingar, deputy director of National Intelligence for Analysis at the Office of the Director of National Intelligence (ODNI). "One word: attitude. For people to collaborate and bring new and vital skills to the intelligence community, we need to change our attitude." [7] Fingar said "60 percent of all U.S. intelligence analysts have five years' experience or less on the job. They expect to collaborate no matter where they are and without concern for chain of command," he said. "There is a sense of urgency, a push from the bottom that didn't exist before." Fingar said intelligence failures proved the need to transform intelligence analysis.

"Analysts have become risk-averse and because of that, many times that attitude precludes good analysis," Fingar said. "We have had more than one major problem every decade since Pearl Harbor. We fail because we are not willing to collaborate or accept the risks of collaboration."

Security

A-Space is open to all 16 elements of the U.S. Intelligence Community. [8]

The first requisite for such a system is that it be secure. To minimize the complexity of the first release, the initial operating capability (IOC) is Web based rather than a full desktop client. Information Week stated that A-Space must have 16 different security waivers and move across 16 differently configured firewalls. However, all this information in the browser, even on the secure intelligence Intranet, is bound to raise hackles, presumably for the 16 Intelligence Community agencies, according to Mike Wertheimer, assistant deputy director of national intelligence for analytic transformation and technology. [1]

Even though the system will be available only to users with security clearance for TOP SECRET Sensitive compartmented intelligence (SCI), security, in the world of intelligence, is not a simple matter of clearance. Individual users will be authorized, or not authorized to access specific "compartments". For example, while an analyst might be authorized access to the HUMINT Control System, a major category of SCI, that does not necessarily allow an analyst working on Russia to see data on spies in Somalia. Somalian and Russian information, sometimes down to the granularity of individual spy contributions, are in separate compartments. [9]

Information Week pointed out that at these security levels, the users themselves need to be monitored. One of the ways A-Space will maintain its security will be through observing traffic patterns, the department doing things like looking out for suspiciously anomalous searches. "Let's not be Pollyanna-ish about this," Wertheimer said. "This is a counter-intelligence nightmare. You've got to ask yourself, if there's one bad apple here, how much can that bad apple learn?" [1]

In many cases, an analyst will have to request access to a new compartment or specific piece of information. It is hoped that this process will be speeded by the web-based services.

Content

To ensure its usefulness, the project will launch with access to the three large databases of current intelligence and Intellipedia. Eventually, A-Space will be capable of carrying documents several levels above Top Secret, certified at a level that 95% of all intelligence can be stored there. Reports will be able to be tagged with important related words or phrases via a system called TagConnect and labeled by usefulness. It will eventually be able to recommend related documents to analysts, much like Amazon recommends related books. [1]

The Library of National Intelligence

The Library of National Intelligence (LNI) is an ODNI project to create a repository of all Intelligence Community disseminated intelligence, regardless of classification. The Central Intelligence Agency is the executive agent for this project. The Library's electronic card catalog – containing summary information for each report – will be classified at the lowest possible level, permitting analysts to discover everything that has been published by the Intelligence Community (IC) regardless of the original classification of the document. Analysts will be able to request the products in accordance with individual access levels and security guidelines. Services provided by LNI will include the ability to request information directly from producers, qualitative measures of value, and statistics on Community coverage of priorities. [4]

One of the components of the LNI is the CIA WIRe, which went into operation on 7 September 2007. It takes all the agency's intelligence information and makes it available to CIA analysts in one database. According to Gus Hunt, CIA executive agent for LNI, the full LNI became available on 31 October 2007. [10]

"It boggles my mind that it took so long to understand the concept of bringing together all the community knowledge to use effectively," Hunt said. "DNI will let users on the top-secret network share information that was agreed to be released. We now will know [all that] we know about any topic."
Dale Meyerrose, ODNI's chief information officer, said LNI will make all information discoverable [i.e., through weak links [6] ], and that is just the starting point. "The pedigree we need to add to data and discovery is huge. It is larger than LNI. The finished product must include intelligence information and open-source information." [7]

Social networking

In a compartmented environment, analysts may be unaware they have a counterpart, in another IC agency, working on a related problem, and they could assist one another. This is equally true of intelligence consumers; a policymaker might be aware of a CIA report of interest, but not one from the State Department's Bureau of Intelligence and Research. Indeed, both analysts and consumers may be unaware of the common interests.

Social networking will be another critical part of A-Space, where analysts can create trusted contacts with other analysts and post profiles that contain updated contact information and details of their areas of expertise. The analysts' areas of expertise may be further defined through text mining software that sifts through analyst e-mail. The social networking model isn't yet set, but the DNI has invited social networking experts the likes of Facebook CEO Mark Zuckerberg and vendors to recommend and help develop specs. [1]

Again, social networking supports interaction through weak links. [6]

Similar architectures

The Force Protection Assessment system uses a similar architecture to provide knowledge management and real-time updates on operational security analyses. [11]

The need is not only seen at top executive levels. [12] According to Tim Hsia, a United States Army captain, "Market trackers absorb information continuously, rigorously track trends, and enable traders to formulate decisions based on the latest news combined with historical data. The ability of market trackers to store and quickly recall historical data should be mimicked by the U.S. government". Hsia mentioned that the needs for intelligence, by operational military units, are not being met in Iraq and Afghanistan. "Expanding this network to encompass a more centralized program of data sharing would not require any additional hardware. A fusion of geography and intelligence within a centralized network can ensure that commanders arrive at any location with the necessary intelligence derived from years of work by previous agencies and military units that have already provided a framework for understanding the enemy and the people in his assigned area. Commanders could then be spared the countless man hours recollecting data that has already been captured thru blood, sweat, and tears [captured by weakly linked researchers [6] ]"

He describes the field need for a database:

A geointel, i.e. geospatial intelligence, database should include all agencies of the U.S. government and also extend to coalition partners. ... only cleared individuals and organizations can access certain intelligence products. The end state would be to encompass each city in the world from South America, Asia, and the Middle East. Each city in the geointel database would comprise of an abundance of historical data consisting of analysis, logistical, intelligence products, and operational summaries from all branches of the military, the State Department, Environmental Protection Agency (EPA), CIA, and National Security Agency. Moreover, the geointel database would incorporate cutting open source intelligence (OSINT) products produced by news agencies, RAND, and other think tanks. By combining products from different branches within the government it would ensure that policy makers from different agencies would have a complete portrait of their region and thus prevent decisions based on data comprised[ sic ] solely from their agency ...

This fusion of intelligence would not have to be centrally managed and each commander or diplomat could individually assign and weigh different parameters and factors internally within his staff when deciding amongst several courses of action. Intelligence could be pushed down to the lowest level which would then facilitate bottom-up refinement as each new unit that was involved in a certain locale could update the existing data to include their latest experiences. The battlefield commander, diplomat, or United States Army Special Forces SF ODA (Operational Detachment-Alpha) team leader could then make informed military, foreign affairs, or political decisions that produce more effective results because the data retrieved from the geointel site would provide them with the latest ground truth supplemented with historic data.

... The structure of the site should provide ease of accessibility while also compartmentalizing information so that only certain areas can be accessed by individuals depending upon their level of clearance. There would need to be a thorough security vetting process to prohibit individuals from being able to achieve sensitive information outside of their region, scope, and responsibility. ... An additional safeguard would be to have superiors and agencies to proof and screen all intelligence products posted by their subordinates so that faulty and inaccurate reporting could be stunted before other organizations implemented inaccurate information .. .readers could ... view the analyst's oeuvre, credentials, and security levels and also allow the reader to directly contact the author as to their assumptions and inquire about related issues pertaining to an intelligence product.

Hsia points out that while SIPRNET (i.e., operating at the SECRET security level, not the higher intelligence levels) is widely available, "Expanding this network to encompass a more centralized program of data sharing would not require any additional hardware", but software changes in the devices now used to access SIPRNET. Depending on the operational needs, it might be necessary to have additional access points. Typically, only the intelligence staff of a command has access to intelligence data above the SECRET level, just as only the operational staff have access to TOP SECRET mission planning.

Cost

Michael Wertheimer emphasized working with small prototypes at first, which are likely to demonstrate failures. If the prototype is small enough that a new version, which addresses the failure, is not expensive, incremental improvement would be the way to control costs. He mentioned that the initial costs, "well under $5 million", will be for servers, software licenses and design. The greatest design challenge will be achieving the needed security. DNI policy is to have A-Space rely, as much as possible, on commercial off-the-shelf (COTS) software. [1]

A service oriented architecture (SOA) was the basic technical mode for building A-space. Eventually, that will allow analysts and developers to write or install their own widgets (i.e., small customized programs) onto their portal page. Widgets might first access Google Maps content, then attach classified layers to a map that could potentially overlay anti-aircraft missile sites with known bunkers. The intelligence community is already blogging, and A-Space could therefore take advantage of RSS feeds for blog content, among other things.[ citation needed ]

It will be implemented as a portal that includes a Web-based word processing tool akin to GoogleDocs, a wiki-based intelligence community encyclopedia and access to three "huge, terabyte databases" of "raw" (i.e., not yet evaluated) data for analysts to examine. It will be scaled for 10,000 users at day one. [1]

Recognition and awards

See also

Related Research Articles

<span class="mw-page-title-main">Defense Intelligence Agency</span> US government agency

The Defense Intelligence Agency (DIA) is an intelligence agency and combat support agency of the United States Department of Defense, specializing in defense and military intelligence.

Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

<span class="mw-page-title-main">Director of National Intelligence</span> US Cabinet-level government official

The director of national intelligence (DNI) is a senior, cabinet-level United States government official, required by the Intelligence Reform and Terrorism Prevention Act of 2004 to serve as executive head of the United States Intelligence Community (IC) and to direct and oversee the National Intelligence Program (NIP). All IC agencies report directly to the DNI. The DNI also serves, upon invitation, as an advisor to the president of the United States, the National Security Council and the Homeland Security Council on all intelligence matters. The DNI, supported by the Office of the Director of National Intelligence (ODNI), produces the President's Daily Brief (PDB), a top-secret document including intelligence from all IC agencies, handed each morning to the president of the United States.

<span class="mw-page-title-main">United States Intelligence Community</span> Collective term for US federal intelligence and security agencies

The United States Intelligence Community (IC) is a group of separate United States government intelligence agencies and subordinate organizations that work both separately and collectively to conduct intelligence activities which support the foreign policy and national security interests of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments.

<span class="mw-page-title-main">Sensitive compartmented information</span> Information relative to U.S. National Security

Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.

<span class="mw-page-title-main">Bureau of Intelligence and Research</span> Intelligence agency in the U.S. State Department

The Bureau of Intelligence and Research (INR) is an intelligence agency in the United States Department of State. Its central mission is to provide all-source intelligence and analysis in support of U.S. diplomacy and foreign policy. INR is the oldest civilian element of the U.S. Intelligence Community and among the smallest, with roughly 300 personnel. Though lacking the resources and technology of other U.S. intelligence agencies, it is "one of the most highly regarded" for the quality of its work.

<span class="mw-page-title-main">Thomas Fingar</span> American academic and civil servant

Charles Thomas Fingar, is a professor at Stanford University. In 1986 Fingar left Stanford to join the State Department. In 2005, he moved to the Office of the Director of National Intelligence as the deputy director of National Intelligence for Analysis and concurrently served as the chairman of the National Intelligence Council until December 2008. In January 2009, he rejoined Stanford as a Payne Distinguished Lecturer in the Freeman Spogli Institute for International Studies.

National Intelligence Estimates (NIEs) are United States federal government documents that are the authoritative assessment of the Director of National Intelligence (DNI) on intelligence related to a particular national security issue. NIEs are produced by the National Intelligence Council and express the coordinated judgments of the United States Intelligence Community, the group of 18 U.S. intelligence agencies. NIEs are classified documents prepared for policymakers.

Intelligence analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberately deceptive information; the analyst must correlate the similarities among deceptions and extract a common truth. Although its practice is found in its purest form inside national intelligence agencies, its methods are also applicable in fields such as business intelligence or competitive intelligence.

<span class="mw-page-title-main">Intellipedia</span> US Intelligence Community encyclopedia

Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC). It was established as a pilot project in late 2005 and formally announced in April 2006. Intellipedia consists of three wikis running on the separate JWICS (Intellipedia-TS), SIPRNet (Intellipedia-S), and DNI-U (Intellipedia-U) networks. The levels of classification allowed for information on the three wikis are Top Secret Sensitive Compartmented Information, Secret (S), and Sensitive But Unclassified information, respectively. Each of the wikis is used by individuals with appropriate clearances from the 18 agencies of the US intelligence community and other national-security related organizations, including Combatant Commands and other federal departments. The wikis are not open to the public.

The Joint Worldwide Intelligence Communication System is the United States Department of Defense's secure intranet system that houses top secret and sensitive compartmented information. JWICS superseded the earlier DSNET2 and DSNET3, the Top Secret and SCI levels of the Defense Data Network based on ARPANET technology.

Michael Wertheimer is a cryptologic mathematician. From October 31, 2005, until June 2009, he was the assistant deputy director and chief technology officer of the Office of the Director of National Intelligence for Analysis. Wertheimer oversaw the coordination of Intelligence Community efforts to bring increased depth and accuracy to analysis through technology. He observed and catalogued the autostasis effect in 1968, which is the opposite of the autokinetic effect. In 2008, Wertheimer successfully launched A-Space, the U.S. Intelligence Community's "Facebook for Spies." This new social network opened in September 2008 for U.S. intelligence analysts and covert operatives across some 16 intelligence agencies to share information. He continues to advocate for reforms in the intelligence community and is currently involved in pressing for adopting Intellipedia, a classified wiki.

Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information used in a phase informally called "connecting the dots", thus creating an "intelligence mosaic". The information may result in multiple analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history. Sherman Kent is often considered the father of modern intelligence analysis. His writings include a 1947 book, Strategic Intelligence for American World Policy.

Intelligence dissemination management is a maxim of intelligence arguing that intelligence agencies advise policymakers instead of shaping policy. Due to the necessity of quick decision-making in periods of crisis, intelligence analysts may suggest possible actions, including a prediction of the consequences of each decision. Intelligence consumers and providers still struggle with the balance of what drives information flow. Dissemination is the part of the intelligence cycle that delivers products to consumers, and intelligence dissemination management refers to the process that encompasses organizing the dissemination of the finished intelligence.

The Schlesinger Report, originally titled A Review of the Intelligence Community, was the product of a survey authorized by U.S. President Richard Nixon late in 1970. The objective of the survey was to identify and alleviate factors of ineffectiveness within the United States Intelligence Community (IC) organization, planning, and preparedness for future growth. The report, prepared by James Schlesinger, Deputy Director of the Office of Management and Budget (OMB), was submitted to Nixon on 10 March 1971.

<span class="mw-page-title-main">Organizational structure of the Central Intelligence Agency</span> Overview of the organizational structure of the Central Intelligence Agency

The CIA publishes organizational charts of its agency. Here are a few examples.

<span class="mw-page-title-main">Mark Lowenthal</span>

Mark M. Lowenthal is an author and Adjunct Professor at the Krieger School of Arts and Sciences at Johns Hopkins University in Baltimore, MD He has written five books and over 90 articles or studies on intelligence and national security. His book Intelligence: From Secrets to Policy has become a standard undergraduate and graduate text.

Geographic information systems (GIS) play a constantly evolving role in geospatial intelligence (GEOINT) and United States national security. These technologies allow a user to efficiently manage, analyze, and produce geospatial data, to combine GEOINT with other forms of intelligence collection, and to perform highly developed analysis and visual production of geospatial data. Therefore, GIS produces up-to-date and more reliable GEOINT to reduce uncertainty for a decisionmaker. Since GIS programs are Web-enabled, a user can constantly work with a decision maker to solve their GEOINT and national security related problems from anywhere in the world. There are many types of GIS software used in GEOINT and national security, such as Google Earth, ERDAS IMAGINE, GeoNetwork opensource, and Esri ArcGIS.

Intelligence sharing is "the ability to exchange intelligence, information, data, or knowledge among Federal, state, local or private-sector entities as appropriate." Intelligence sharing also involves intergovernmental bilateral or multilateral agreements and through international organizations. Intelligence sharing is meant to facilitate the use of actionable intelligence to a broader range of decision-makers.

All-source intelligence is a term used to describe intelligence organizations, intelligence analysts, or intelligence products that are based on all available sources of intelligence collection information.

References

  1. 1 2 3 4 5 6 7 Hoover, J. Nicholas (23 August 2007), "U.S. Spy Agencies Go Web 2.0 in Effort To Better Share Information", InformationWeek
  2. Bain, Ben (3 September 2008), "A-Space set to launch this month", Federal Computer Week, archived from the original on 6 September 2008
  3. "National security and social networking are compatible", Government Computer News, 23 July 2009
  4. 1 2 3 INSA Analytic Transformation Conference (PDF), 4–6 September 2007, archived from the original (PDF) on 27 February 2008
  5. McAfee, Andrew (14 January 2008), "Why Not Widen the Flow?", Harvard Business School Faculty Blogs, archived from the original on 9 January 2008
  6. 1 2 3 4 Granovetter, Mark (May 1973), "The Strength of Weak Ties", American Journal of Sociology, 78 (6): 1360–1380, doi:10.1086/225469, S2CID   59578641
  7. 1 2 Miller, Jason (10 September 2007), "Young feds bring intell changes: A workforce bought up to use collaboration tools is making the CIA Web 2.0-savvy", Federal Computer Week, archived from the original on 25 December 2007
  8. Barnett, George A. (7 September 2011). Encyclopedia of Social Networks. p. 332. ISBN   9781506338255.
  9. Cardillo, Robert (10 December 2010). "Intelligence Community Reform, A Cultural Evolution". Archived from the original on 22 December 2011. Retrieved 18 February 2019.
  10. Miller, Jason (6 September 2007). "CIA to launch integrated intell service" . Retrieved 18 February 2019.
  11. Miller, Jason (26 November 2007), "DIA at work on new data-sharing system", Federal Computer Week, archived from the original on 13 January 2008
  12. Hsia, Tim (November 2007), "Intelligence Collection and Sharing (Updated)", Small Wars Journal
  13. "32. Facebook for Spies". Time . December 2008. Archived from the original on 2 November 2008. Retrieved 9 January 2009.
  14. Jackson, Joab (20 November 2009). "A-Space melds social media and intelligence gathering" . Retrieved 18 February 2019.