Mini-Me: Secret World Has a New Story Line — Sharing TOO MUCH (We Do Not Make This Stuff Up….)

Corruption, Government, IO Impotency
0Shares
Who? Mini-Me?

Huh?

Intell community's new problem: Sharing too much data

Rutrell Yasin

GCN Sep 19, 2012

After a Nigerian man attempted to detonate plastic explosives hidden in his underwear while aboard a Northwest Airlines flight from Amsterdam to Detroit on Dec. 25, 2009, critics and the media accused intelligence agencies of still being in silos and not sharing information.

But that wasn’t the case, retired Air Force Gen. Michael Hayden, former director of the CIA and National Security Agency, told a Washington audience recently.

The issue was not the lack of information sharing. “The issue was we couldn’t deal with the volume of information we were sharing,” said Hayden, who was director of the Central Intelligence Agency from 2006 to 2009 and is currently a principal at the Chertoff Group, a security consultancy.


Related coverage:

CIA venture arm targets a secure cloud platform

CIA wants big data, petascale computing to speed info analysis


“There is so much data coming at us, we are now challenged by the volume of what’s coming at us” rather than being engaged in bureaucratic turf wars over sharing information, Hayden told industry and government representatives attending the SAP National Security Services (NS2) Solutions Summit in Falls Church, VA, Sept 18th.

The intelligence community needs technology that aids analysts in understanding the complexities of a changing world and empowers them to make even more informed decisions, Hayden said.

Putting the current global situation in context, he listed five major national security concerns that, incidentally, were the top concerns when he left the government three years ago, he noted.

They are: the Iranian nuclear program, the emergence of China as a global player (China doesn’t have to be an enemy, Hayden said), transnational crime in Mexico, cyber defense, and terrorism.

An era of globalization has chipped away against the power of the state and pushed power – for good or evil – down to sub-national units, Hayden said. “In the case of terrorism and cyber, you push great destructive potential almost down to the individual level,” he said.

Many companies’ data is being compromised by cyber attacks launched by nation states, Hayden said. And while many citizens might expect their country to play a role in keeping them safe, cybersecurity legislation is not moving very fast and probably will not pass in the current congressional session, he said.

With regard to cyber defense, “we are not quite there in the field in the same way if you were being physically attacked,” because “we haven’t figured out what we want government to do and what we will allow the government to do,” he said.

In light of the current security concerns, here is what the intelligence community wants from the technology industry, Hayden said:

• Don’t build technology for technology’s sake. “Your fundamental task is to enable the analysts,” Hayden said. Make all the complex machines you want, he said, as long as it leads to the analysts doing a better job.

• Figure out how to protect personal information. Hayden said he’s been in front of many congressional committees saying, “‘Trust us. We would never abuse it,’ just doesn’t work in American political culture.” So work on how data can be integrated for detecting threats and segregated for policy and law enforcement reasons, he said.

• Whatever you build, make it affordable.

• Bake security into the technology. Everyone in the intelligence field knew that something like WikiLeaks — which published submissions of secret information, news leaks and classified media from anonymous sources — was inevitable.

Hayden also said the intelligence community has to move beyond the concept of “targeting.” Databases are basically being used today to target people, literally in the sense of putting a weapon on somebody or figuratively by screening who gets on airplanes.

The country has been at war for 11 years and targeting is the dominant thinking in the intelligence community. But it is not the only thing intelligence agencies should be doing, Hayden said. It is not just about targeting, but enabling the analysts to make the right macro decision.

“Keep that in mind as you advance technology,” Hayden said. Data has to be collected, organized and presented in a way that helps the analysts “build as much wisdom as possible to pass on to the policy maker in a world that remains dangerous and is rapidly changing,” Hayden said.

Phi Beta Iota:  General Hayden appears to be severely misleading the press and the public.  The US Intelligence Community is NOT sharing too much data for the simple reason that they are not PROCESSING most of what they collect, and they STILL have over 80 different data stove-pipes none of which can be accessed coherently by individuals who have not spent a lifetime learning the idiosyncacies of each.  General Hayden neglects to point out that the analytic population is either immature or long in the tooth and not joint or well-educated in any sense of the word; that the US secret world continues to lack a strategic analytic model for creating holistic collection management, processing, and inter-disciplinary multi-domain analytic solutions, or that we still do not have today, 27 years after first conceptualized, an all-source analytic workstation.  The secret world continues to cost at least $80 billion a year, perhaps as much as $120 billion a year if not more, and it continues to be absolutely marginal in relation to policy, acquisition, or operations in the national security arena, and totally worthless across Whole of Government.  We are at a point where we could do better — as Keith Hall visualized in his response to Boyd Sutton for the study on Global Coverage completed in 1997 –creating very small analytic teams and giving each team for each topic $10 million a year to spend on open sources and methods (NOT the betlway bandit butts in seats, but real world indigenous eyes on experts such as are exploited by a tiny handful of honest providers).  That adds up to $3 billion a year.  The President could if desired begin to reduce the secret budget by $20 billion a year and NOT see the unemployment consequences that are mis-represented to him.  MOST of the money is corporate vaporware, NOT salaries — and as Robert Steele has pointed out on numerous occasions, reform can be job and revenue neutral district by district, redirecting the good people trapped in a bad system toward more useful employment across a totally reformed national education, intelligence, and research network that focuses on the public interest instead of contrived needs.  It's time we get a grip on reality.  Intelligence with integrity — what a powerful concept.

See Also:

2008 Open Source Intelligence (Strategic)

2006 Sutton (US) Global Coverage, Looking Backward, Looking Forward

2001 Threats, Strategy, and Force Structure: An Alternative Paradigm for National Security

1997 Sutton (US) The Challenge of Global Coverage

Journal: Reflections on Integrity UPDATED + Integrity RECAP

HUMINT Trilogy:

–  Intelligence for the President–AND Everyone Else

–  Fixing the White House and National Intelligence

–  Human Intelligence: All Humans, All Minds, All the Time

Robert Steele: Data Is the New Oil BUT No One Is Serious About Holistic Analytics, True Cost Economics, Machine or Man-Machine Translation, or M4IS2

Worth a Look: 1989 All-Source Fusion Analytic Workstation–The Four Requirements Documents

Financial Liberty at Risk-728x90




liberty-risk-dark