6.0 SUCCESSFUL IMPLEMENTATION
National Geospatial Agency and the Director of Intelligence Agency have previously partnered on several grounds. For instance, the NGA and DNI partnership has resulted to the positive relationships in implementing the IC ITE. The underpinnings creates the highest priority for the integration of the infrastructure that will be responsible in the NGA while working closely with various integrated groups that are help in reshaping the intelligence community[ Nga, "Association Of Former Intelligence Officers Visit To NGA”, Nga.Mil, last modified 2014, accessed March 16, 2017, https://www.nga.mil/MediaRoom/SpeechesRemarks/Pages/AFIOVisit.aspx.]. The future of the NGA and the IC ITE depends naturally on the decisions that the DNI is taking.
For instance, following the aftermath of the September 11, 2001 the community proved that thousands of operations required creating of cells while providing various joint tasks forces and providing the right decisions making mechanisms for sharing the various approaches in fusing different data sets. Hence, the relationship between the two departments is based on the need and the ability to integrate the IT infrastructure that helps in sharing the National Intelligence between the two different units. The wide integration of the intelligence for the call immersion lives at interacting and experimenting for the data and the GEOINT for its core implementation core.
The immersion provides a deep analysis from the shared experiences between the DNI and the NGA while providing a meaningful and predictive insight for the proper working of the different pillars that are involved in the analytical capabilities between the two groups. The next generation collection of transformation encourages the collection and enabling of customers to make sure that the data presented is in-light in solving the problem while providing the right IT investment infrastructure. The DNI and NGA enables the adoption of the Next generation IT pillars which are involved more in sharing data between the sixteen agencies while ensuring that US Government is fully served with intelligence updates. The research and investment encourages the adoption of the agreements, grants, initiatives and partnership while focusing on the various building blocks for participatory, analytics, immersive intelligence and persistence means of research on big data.
IC ITE Enterprise (IC ITE) transformative group is under the DNI Vision for the appropriate intelligence and Integration for the IC ITE operations. The common platform includes developing a common platform for the community for secure and easily shared information.[�[Â Scott Goss and Ester Woods, "Federal Contract Opportunity: RFI For The Intelligence Community (IC) Information Technology Enterprise (ITE) Desktop Environment (DTE) Desktop Services Model Proof Of Concept, Updated Jul 16, 2013â, Govtribe.Com, last modified 2013, accessed March 16, 2017, https://govtribe.com/project/rfi-for-the-intelligence-community-ic-information-technology-enterprise-ite-desktop-environment-dte-desktop-services-model-proof-of-concept.]he IC creates a powerful for platform for innovative and secure desktops for levels. The Desktop Environment is depended on the desktop application for the common services access. The joint team for DNI and NGA create a delivery mechanism for pilot for the investigative model.
6.2.1Lessons Learnt from similar InitiativesÂ
The INSA operates with the Cyber Council involved in the Intelligence Community Information Technology Enterprise (IC ITE). The Department of Defense (DOD) for the thought leaders and chief information officers (CIOs). The IC ITE Task Force seeks in creating a productive private dialogue for partnership for the appropriate successful implementation. The IC ITE focuses on the greater information sharing, integration for safeguarding for the IC and the common IT approaches for cost reduction. The INSA engages the IC ITE Task Force in a productive dialogue that helps identify the private technology for the appropriate practices in a large scale environment. It is clear from what is learn of the role of the DNI and that IC ITE, the greater role is concerned in the
Business Model
Governance Model
Technology innovation
Security and risk management.
Clearly, the office of the Director of National Intelligence is entitled in improving the sharing of information within the Intelligence Community and Information Technology Enterprise (IC ITE). In this case, the IC ITE services provide the right consumption for the intelligent products. The appropriate approach for military intelligence oversights with the right responsibility for the FISMA as covered through the national security systems while focusing on the responsibility and the implementing of the legal provisions. The Director of the Central Intelligence includes a clear assessment of the organized agencies who solicit their information from the central database. In this case, the Department of the Homeland Security is entitled towards creating the appropriate civilian defense and intelligence agencies responsible in developing policies for guidelines of the national security. Also, much in a way, the National Security Agency is responsible in member of the intelligence community as overseen by the ODNI.Â
7.1 Summary of the Key Points
The report has also explored the huge role of the general DNI administration environment. Much of the arguments have focused on how the DNI seeks to provide information services to the GSA. The federal information system is therefore involved in managing the information systems for providing the government with the wide information for services of identifies, managing and providing access to information in a secure environment. The responsibility of the government focuses predominantly on the GAO for the establishing governmentâs ability in creating the appropriate associations in identifying possible threats, determining sources of risk and vulnerabilities while equipping the office with the right security personnel. The DNI is concerned with the quality of the IT enterprise on behalf of the 16 agencies, the IT services being rendered, the quality of the authentication being provided as well as the authorization. These findings have been validated by the literature review which has provided my detailed information for sharing information, creating the right awareness for the DNI office as well as improving the governance mechanism for the various changes in business models. Chapter has further validated these findings by introducing more critical information on the IC ITE environment that the DNI operates from. Either way, it has been clear that the sharing information depends on the quality of communication being dispensed between the various departments. An important aspect is the quality of trust and security parameter that the DNI takes as almost his personal responsibility. However, in the past there have been possible security breaches, for instance the recent issue of the Trump links to the Russia FSB or Clinton email links. Hence, the DNI has not focused entirely in protecting the politicians from exposing the private lives. Groups such as Julie Assang have proved to undermine the services of the DNI, hence branding the agencies guilty in most cases.
7.2 Recommendations;
There is a need to govern the intelligence and sharing procedures by ensuring that the DNI shares information properly and respectively. The DNI should hence adopt the rules of the road by ensuring that it adopts the appropriate standard deviation. The DNI should incorporate the long standing application for the appropriate observation as well as ensure that the different subsections of works are related to DNI operations.;
The DNI should also improve the legislation concerning the mandates and operations of the ODNI. As the lead officer, the DNI should petition the congress and ask for the restructuring of laws that hamper the quality of the communication and sharing between the ODNI and other agencies. In response, the Congress should motivate evaluate possible ongoing reviews and amendment of the law while engaging the proper discourse of the public work.;
The ODNI should also publish the intelligence while ensuring that the principle responsibility and security matters are considered as important. In this case, the ODNI should ensure the efficient circulation of communication between the various departments involved in the intelligence process.;
The ODNI should work carefully with the staff while determine the specificity and the substantive intelligence patterns that motivate the proper satisfaction and the ratification of the intelligence protocols. In particular, ODNI should provide the required information that will help in reducing bottlenecks that hamper the ODNI from perfect excellence and ratification of the appropriate intelligence production which operates at different stages.;;
The ODNI should also discourage the politicization of the congress while providing a recommendable frameworks that will revolve around the appropriate justification and experiences that are involved at different stages of sharing information. The DNI ensures that briefings should be complete while ensuring that there is a greater possibility of caveats for uncertainties.; The approach seeks in recognizing and responding to the full support of the autonomy of the ODNI. Hence, in relation to the services that ODNI is providing, there should be no external influence of either case.;
8.0 References
Ackerman, R. (2013). IC ITE Builds From the Desktop Up. afcea. Retrieved 9 March 2017, from http://www.afcea.org/content/?q=IC ITE-builds-desktop.
Agrell, Wilhelm and Gregory F Treverton. 2009. National Intelligence Systems: Current Research And Future Prospects. 1st ed. Cambridge: Cambridge University Press.
Anne, D. (2017). The U.S. Intelligence Community: Selected Cross-Cutting Issues. fas.org. Retrieved 9 March 2017, from https://fas.org/sgp/crs/intel/R44455.pdf.
Assuredconsulting,. (2017). IC ITE Integration SME | Assured Consulting Solutions. Assured Consulting Solutions. Retrieved 16 March 2017, from https://assuredconsulting.catsone.com/careers/index.php?m=portal;a=details;jobOrderID=8278167
Best, Richard A. 2010. Intelligence Reform After Five Years. 1st ed. [Was[Washington, D.C.]ngressional Research Service.
BOSCOIANU, O. ; PIRNUTA, M. (2011). THE CULTURAL EFFORT OF INFORMATION SHARING IN THE KNOWLEDGEBASED SOCIETY. INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 2011. Retrieved 16 March 2017, from http://www.afahc.ro/ro/afases/2011/manag/PIRNUTA_BOSCOIANU.pdf
Butterworth, B. (2016). 911: Do We Need A Director of National Intelligence?. Breaking Defense. Retrieved 16 March 2017, from http://breakingdefense.com/2016/09/911-do-we-need-a-director-of-national-intelligence/
Clapper, J. (2016). Statement for the Record Worldwide Threat Assessment of the US Intelligence Community. Retrieved 16 March 2017, from https://www.dni.gov/files/documents/SASC_Unclassified_2016_ATA_SFR_FINAL.pdf
Congress,. 2009. Congressional Record (Bound Volumes): Volume 150, Part 19. 1st ed. Washington: Government Printing Office.
Darren, S. (2014). Department of Navy Chief Information Officer Mobile â CHIPS Articles: Darren A. Sawyer Discusses the Navy Intelligence Community Enterprise Information Technology Transition. Doncio.navy.mil. Retrieved 9 March 2017, from http://www.doncio.navy.mil/mobile/ContentView.aspx?ID=5267;TypeID=21
Defense Intelligence Agency,. (2015). 2015. â2015 â 2016 DNI Innovation Implementation Plan. Dia.Mil. Retrieved 9 March 2017, from http://www.dia.mil/Portals/27/Documents/Business/Innovation/2015_2016_DIA_INO_Implentation_Plan_RD.pdf.
Desouza, K. (2003). Strategic contributions of game rooms to knowledge management: some prelimenary insights. Information & Management, 41(1), 63-74. http://dx.doi.org/10.1016/s0378-7206(03)00027-2
Dni.gov,. (2016). IC Information Sharing Executive. Dni.gov. Retrieved 16 March 2017, from https://www.dni.gov/index.php/about/organization/ic-information-sharing-executive
Dni.gov,. (2017). Chief Information Officer â What We Do. Dni. Retrieved 9 March 2017, from https://www.dni.gov/index.php/about/organization/chief-information-officer-what-we-do.
Dni.gov,. (2017). IC CIO Enterprise Integration & Architecture. Dni.gov. Retrieved 9 March 2017, from https://www.dni.gov/index.php/about/organization/chief-information-officer/ic-cio-enterprise-integration-architecture
Dni.gov,. (2017). IARPA Launches âCREATEâ Program To Improve Reasoning Through Crowdsourcing. Dni.gov. Retrieved 16 March 2017, from https://www.dni.gov/index.php/newsroom/press-releases/224-press-releases-2017/1482-iarpa-launches-create-program-to-improve-reasoning-through-crowdsourcing
Dni.gov,. (2017). Information Security Marking Access. Dni.gov. Retrieved 16 March 2017, from https://www.dni.gov/index.php/about/organization/chief-information-officer/information-security-marking-access/78-dni
Dni.gov,. (2017). U.S. Intelligence Community Budget. Dni.gov. Retrieved 16 March 2017, from https://www.dni.gov/index.php/intelligence-community/ic-policies-reports/ic-policies-2
Englander, I. (1996). The architecture of computer hardware and systems software (1st ed.). New York: Wiley.
Goss, S. & Woods, E. (2013). Federal Contract Opportunity: RFI for the Intelligence Community (IC) Information Technology Enterprise (ITE) Desktop Environment (DTE) Desktop Services Model Proof of Concept, updated Jul 16, 2013. Govtribe.com. Retrieved 16 March 2017, from https://govtribe.com/project/rfi-for-the-intelligence-community-ic-information-technology-enterprise-ite-desktop-environment-dte-desktop-services-model-proof-of-concept
Iannotta, B. (2013). Wanted: IC ITE acquisition strategy Network overhaul aims to soften intel budget pain. Deep Dive Intel. Retrieved 9 March 2017, from http://www.deepdiveintel.com/2013/02/13/wanted-IC ITE-acquisition-strategy/
INSA,. (2014). INTELLIGENCE AND NATIONAL SECURITY ALLIANCE INTELLIGENCE COMMUNITY INFORMATION TECHNOLOGY ENTERPRISE TASK FORCE SEPTEMBER 2014. Retrieved 16 March 2017, from http://IC ITE: INDUSTRY PERSPECTIVES
Insaonline.org,. (2017). IC ITE â Doing in Common What is Commonly Done. Insaonline.org. Retrieved 9 March 2017, from http://www.insaonline.org/i/d/a/b/IC ITE_doing_common.aspx
Jackson, S. (2017). H.R. 955: Cyber Defense National Guard Act. Retrieved 16 March 2017, from https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=Widgets+Director+of+National+Intelligence&*
Jason, A. (2014). The Basics of Information Security. Opensource.gov. Retrieved 9 March 2017, from https://www.opensource.gov/providers/safari/mynotes
Karamanian, A., Dessart, F., & Tenneti, ,. (2011). PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Network (1st ed.). New York: Pearson Education.
Mary, B. & Garson, G. (2013). Public Information Management and E-Government. Opensource.gov. Retrieved 9 March 2017, from https://www.opensource.gov/providers/safari/9781466630031?bookview=overview. Organization Behavior and Organization Theory
Mazzafro, J. (2012). Blog: Petraeus, Benghazi, the DNI and IC-ITE. Afcea. Retrieved 9 March 2017, from http://www.afcea.org/content/?q=petraeus-benghazi-dni-and-ic-ite.
Naegele, T. (2016). Common Desktop, the Foundation for IC ITE, Expands Footprint. Retrieved 9 March 2017, from https://www.govtechworks.com/common-desktop-the-foundation-for-ic-ite-expands-footprint/#gs.LUc5Yog
Ncsc.gov,. (2017). National Insider Threat Task Force: NITTF Training â NCSC. Ncsc.gov. Retrieved 16 March 2017, from https://www.ncsc.gov/nittf/training.html
Ncsc.gov,. (2017). National Insider Threat Task Force: NITTF Training â NCSC. Ncsc.gov. Retrieved 16 March 2017, from https://www.ncsc.gov/nittf/training.html
Nga,. (2014). Association of Former Intelligence Officers Visit to NGA. Nga.mil. Retrieved 16 March 2017, from https://www.nga.mil/MediaRoom/SpeechesRemarks/Pages/AFIOVisit.aspx
Nga,. (2017). DNI directorâs first official visit to NGA. Retrieved 16 March 2017, from https://www.nga.mil/MediaRoom/News/Pages/DDIAvisitsNGA.aspx
Nimkar, S. (2016). Promoting individual health using information technology: Trends in the US health system. Health Education Journal, 75(6), 744-752. http://dx.doi.org/10.1177/0017896916632790
Quiggin, T. (2007). Seeing the Invisible: National Security Intelligence in an Uncertain Age (1st ed.). World Scientific.Â
Robert, A. (2016). Lessons Learned Guide Intelligence Community Information Enterprise. Afcea. Retrieved 9 March 2017, from http://www.afcea.org/content/?q=lessons-learned-guide-intelligence-community-information-enterprise.
Serbu, J. (2016). Intelligence community launches classified marketplace for cloud technology. FederalNewsRadio.com. Retrieved 9 March 2017, from http://federalnewsradio.com/cloud-computing/2016/04/intelligence-community-launches-classified-marketplace-cloud-technology/
Shorrock, Tim. 2009. Spies For Hire: The Secret World Of Intelligence Outsourcing Tim Shorrock. 1st ed. New York: Simon & Schuster.
Thöni, Andreas and A Min Tjoa. 2015. âInformation Technology For Sustainable Supply Chain Management: A Literature Surveyâ. Enterprise Information Systems, 1-31. doi:10.1080/17517575.2015.1091950.
United States Government,. 2012. Intelligence Community Legal Reference Book. 1st ed. [Was[Washington, D.C.]fice of the Director of National Intelligence, Office of General Counsel.
Vinnik, M. 2014. âUSE OF INFORMATION TECHNOLOGY IN RESEARCH WORK OF FUTURE SOFTWARE ENGINEERSâ. Information Technologies In Education, no. 18: 132-138. doi:10.14308/ite000476.
Yang, Hyungwook, Hyeri Kim, and Hangbae Chang. 2015. âA Study On Industrial Security Experts Demanding Forecasting In Intelligent Sensor Networkâ. International Journal Of Distributed Sensor Networks 11 (9): 935492. doi:10.1155/2015/935492.
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…