DIA upgrades Alien classified data system
Connecting state and local government leaders
The Defense Intelligence Agency has upgraded its system for sharing classified information across DOD intelligence offices.
The Defense Intelligence Agency has upgraded its system for sharing classified information across Defense Department intelligence offices.
New capabilities of DIA's All Source Intelligence Environment (Alien) Data Services Program include faster querying, more consistent data presentation and greater control over who gets to see what, said Ken Bartee, president and chief executive officer at McDonald Bradley, which oversaw the upgrade.
DIA's goal for Alien was to provide a facility to share data across all DOD Intelligence Information Systems (DODIIS) domains and offices on the Joint Worldwide Intelligence Communication System.
Alien is 'primarily a top-secret network used to support our combatant commanders ... and defense intelligence agencies and all their components,' Bartee said. It offers 'a standard interface to all the data that is out there, both at the commands [such] as the DIA and other places.'
Landing 2, as the upgrade is known, will offer access for DODIIS through a service-oriented architecture, the first-ever use of SOA in an environment with these security requirements, Bartee said.
Traditionally, intelligence systems tended to be stovepiped operations, said John Sutton, senior vice president at McDonald Bradley. One repository may have data residing in a Sybase system, and another division would use an IBM system. 'The data would be structured [in the two systems] completely differently,' he said.
Moreover, analysts would have to log in to multiple systems to get at the different sets of data. 'Now you have one interface [that] gets you access to all these data stores.'
One of the primary objectives of the upgrade was to improve the access control system so that individuals can get to the data they need more easily but remain locked out of data that is not pertinent to their jobs.
'It's really moved to rules-based access,' Sutton said. 'It is not giving you access as an individual, but recognizes your role [and] what types of data you should have access to.
'The rules approach has been done on individual systems before but has never been done on a series of systems,' Sutton said.
NEXT STORY: Redmond gets down to business