How The CIA Is Making Sense Of Big Data

For decades, the CIA’s spying strategy remained relatively unchanged, perhaps reflected best in the fact that last year’s creation of a Directorate for Digital Innovation was the first new directorate within the spy agency in more than 50 years.

Helmed by Deputy Director Andrew Hallman, the new entity is a result of big data, the technological explosion of connectivity and data among devices, sensors and people, and the CIA’s wish to make sense of it all.

In a rare public appearance at Tuesday’s Cloudera Federal Forum, which was hosted by the custom events unit of Nextgov's parent company, Government Executive Media Group, Hallman said the CIA’s old information collection strategies couldn’t “withstand the accelerating rate of information” produced globally or “keep pace with policymakers’ more rapid need to make decisions.” In short, the CIA wants to be more predictive and less reactive.

“We are developing policy approaches that affect outcomes instead of becoming reactionary,” Hallman said. “We’re not here to chase the news.”

With the CIA’s technology backbone, including a cloud computing environment built by Amazon Web Services and other unique capabilities, now fully in place, Hallman said the spy agency is “taking next steps” to solidify its strategy around harnessing this explosion of information.

Big data technologies allow analysts to piece together the “digital exhaust” of adversaries, Hallman said. And even “small fragments” represent major opportunities. Analysts can use disparate data and accompanying analytic capabilities to put together a puzzle, even if all the pieces are spread randomly over the kitchen table.

“The whole can be pieced together from fragments,” Hallman said.

Hallman said the directorate is focused on three ideas: “Optimizing the CIA’s underlying digital ecosystem; establishing sound data management principles; and making data useful to increasingly sophisticated consumers.”

These ideas, he said, represent not only a major technical change to the agency’s operations, but a cultural transformation as well. An increased emphasis on data requires a reduction in old bureaucratic and management policies – allowing the agency to get out of the way of itself and its analysts, who act as stewards of the intelligence community’s greatest asset.

Optimizing the digital ecosystem requires a “decentralized governance process with just enough high-level guidance to operationalize,” Hallman said. “Information is the currency of the realm in the intelligence world, and we want all our analysts to have (currency) in their pockets.”

If the CIA has rebuilt its technology infrastructure, the next step is “rewiring its organizational neural pathways” to ensure, for example, that the kinds of lapses in information sharing that preceded 9/11 don’t reoccur. He’s put an emphasis on rapid dynamic teaming, or digitally networked teams, which collaborate in real-time “to storm vexing problems” when strange trends emerge or data suggests “subtle shifts or discontinuities.”

The emphasis is not only on sharing information with the CIA and other agencies within the IC, but “making the data useful to increasingly sophisticated consumers," Hallman added.

“Given the complexity of national security challenges we face today, we have to optimize not only technology but our officers’ minds,” he said. “We are developing policy approaches that affect the outcomes instead of becoming reactionary.”

NextGov: http://bit.ly/1pZy40b

« Who Is The Cybersecurity Guy In Your Organisation?
Cognitive Computing Market Forecast To Be Worth $31Billion In 3 Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Purdicom

Purdicom

Purdicom (formerly known as Selcoms) is an award winning distributor specialising in Wireless, Cloud & Security technologies.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

PowerDMARC

PowerDMARC

PowerDMARC is a domain security and email authentication SaaS platform that helps organizations protect their domain name, brand, and emails against unauthorized use.