Knowledge (XXG)

A-Space

Source 📝

308:, "Market trackers absorb information continuously, rigorously track trends, and enable traders to formulate decisions based on the latest news combined with historical data. The ability of market trackers to store and quickly recall historical data should be mimicked by the U.S. government". Hsia mentioned that the needs for intelligence, by operational military units, are not being met in Iraq and Afghanistan. "Expanding this network to encompass a more centralized program of data sharing would not require any additional hardware. A fusion of geography and intelligence within a centralized network can ensure that commanders arrive at any location with the necessary intelligence derived from years of work by previous agencies and military units that have already provided a framework for understanding the enemy and the people in his assigned area. Commanders could then be spared the countless man hours recollecting data that has already been captured thru blood, sweat, and tears " 361:... The structure of the site should provide ease of accessibility while also compartmentalizing information so that only certain areas can be accessed by individuals depending upon their level of clearance. There would need to be a thorough security vetting process to prohibit individuals from being able to achieve sensitive information outside of their region, scope, and responsibility. ... An additional safeguard would be to have superiors and agencies to proof and screen all intelligence products posted by their subordinates so that faulty and inaccurate reporting could be stunted before other organizations implemented inaccurate information .. .readers could ... view the analyst's oeuvre, credentials, and security levels and also allow the reader to directly contact the author as to their assumptions and inquire about related issues pertaining to an intelligence product. 369:(i.e., operating at the SECRET security level, not the higher intelligence levels) is widely available, "Expanding this network to encompass a more centralized program of data sharing would not require any additional hardware", but software changes in the devices now used to access SIPRNET. Depending on the operational needs, it might be necessary to have additional access points. Typically, only the intelligence staff of a command has access to intelligence data above the SECRET level, just as only the operational staff have access to TOP SECRET mission planning. 141:(ODNI). "One word: attitude. For people to collaborate and bring new and vital skills to the intelligence community, we need to change our attitude." Fingar said "60 percent of all U.S. intelligence analysts have five years' experience or less on the job. They expect to collaborate no matter where they are and without concern for chain of command," he said. "There is a sense of urgency, a push from the bottom that didn't exist before." Fingar said intelligence failures proved the need to transform intelligence analysis. 319:, database should include all agencies of the U.S. government and also extend to coalition partners. ... only cleared individuals and organizations can access certain intelligence products. The end state would be to encompass each city in the world from South America, Asia, and the Middle East. Each city in the geointel database would comprise of an abundance of historical data consisting of analysis, logistical, intelligence products, and operational summaries from all branches of the military, the 22: 234:
original classification of the document. Analysts will be able to request the products in accordance with individual access levels and security guidelines. Services provided by LNI will include the ability to request information directly from producers, qualitative measures of value, and statistics on Community coverage of priorities.
80:"Analytic Transformation seeks to change how we approach analysis, how we interact with our customers and each other, and is one of the principal priorities of the Director of National Intelligence. US Intelligence is engaged in a fundamental transformation of the Analysis mission at the national level." 392:
It will be implemented as a portal that includes a Web-based word processing tool akin to GoogleDocs, a wiki-based intelligence community encyclopedia and access to three "huge, terabyte databases" of "raw" (i.e., not yet evaluated) data for analysts to examine. It will be scaled for 10,000 users at
380:
emphasized working with small prototypes at first, which are likely to demonstrate failures. If the prototype is small enough that a new version, which addresses the failure, is not expensive, incremental improvement would be the way to control costs. He mentioned that the initial costs, "well under
233:
is the executive agent for this project. The Library's electronic card catalog – containing summary information for each report – will be classified at the lowest possible level, permitting analysts to discover everything that has been published by the Intelligence Community (IC) regardless of the
350:
This fusion of intelligence would not have to be centrally managed and each commander or diplomat could individually assign and weigh different parameters and factors internally within his staff when deciding amongst several courses of action. Intelligence could be pushed down to the lowest level
388:
was the basic technical mode for building A-space. Eventually, that will allow analysts and developers to write or install their own widgets (i.e., small customized programs) onto their portal page. Widgets might first access Google Maps content, then attach classified layers to a map that could
254:, ODNI's chief information officer, said LNI will make all information discoverable , and that is just the starting point. "The pedigree we need to add to data and discovery is huge. It is larger than LNI. The finished product must include intelligence information and open-source information." 276:
Social networking will be another critical part of A-Space, where analysts can create trusted contacts with other analysts and post profiles that contain updated contact information and details of their areas of expertise. The analysts' areas of expertise may be further defined through
249:"It boggles my mind that it took so long to understand the concept of bringing together all the community knowledge to use effectively," Hunt said. "DNI will let users on the top-secret network share information that was agreed to be released. We now will know we know about any topic." 355:
SF ODA (Operational Detachment-Alpha) team leader could then make informed military, foreign affairs, or political decisions that produce more effective results because the data retrieved from the geointel site would provide them with the latest ground truth supplemented with historic
144:"Analysts have become risk-averse and because of that, many times that attitude precludes good analysis," Fingar said. "We have had more than one major problem every decade since Pearl Harbor. We fail because we are not willing to collaborate or accept the risks of collaboration." 193:
pointed out that at these security levels, the users themselves need to be monitored. One of the ways A-Space will maintain its security will be through observing traffic patterns, the department doing things like looking out for suspiciously anomalous searches. "Let's not be
122:'s insight, "The Strength of Weak Ties" (SWT) was that strong ties are not enough for the best innovative environments. Strong ties between people arise from long-term, frequent, and sustained interactions; weak ties from infrequent and more casual ones. A tool such as 339:, and other think tanks. By combining products from different branches within the government it would ensure that policy makers from different agencies would have a complete portrait of their region and thus prevent decisions based on data comprised [ 217:. Eventually, A-Space will be capable of carrying documents several levels above Top Secret, certified at a level that 95% of all intelligence can be stored there. Reports will be able to be tagged with important related words or phrases via a system called 263:
In a compartmented environment, analysts may be unaware they have a counterpart, in another IC agency, working on a related problem, and they could assist one another. This is equally true of intelligence consumers; a policymaker might be aware of a
163:
stated that A-Space must have 16 different security waivers and move across 16 differently configured firewalls. However, all this information in the browser, even on the secure intelligence Intranet, is bound to raise hackles, presumably for the 16
118:, is a means of sharing information that, in the normal course of events, might not be seen at all. He pointed out that "companies that rely heavily on innovation" spend considerable effort improving the communications among close colleagues. 179:(SCI), security, in the world of intelligence, is not a simple matter of clearance. Individual users will be authorized, or not authorized to access specific "compartments". For example, while an analyst might be authorized access to the 381:$ 5 million", will be for servers, software licenses and design. The greatest design challenge will be achieving the needed security. DNI policy is to have A-Space rely, as much as possible, on commercial off-the-shelf (COTS) software. 48:. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The 281:
software that sifts through analyst e-mail. The social networking model isn't yet set, but the DNI has invited social networking experts the likes of Facebook CEO Mark Zuckerberg and vendors to recommend and help develop
684: 351:
which would then facilitate bottom-up refinement as each new unit that was involved in a certain locale could update the existing data to include their latest experiences. The battlefield commander, diplomat, or
389:
potentially overlay anti-aircraft missile sites with known bunkers. The intelligence community is already blogging, and A-Space could therefore take advantage of RSS feeds for blog content, among other things.
159:
The first requisite for such a system is that it be secure. To minimize the complexity of the first release, the initial operating capability (IOC) is Web based rather than a full desktop client.
52:(DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. A-Space went live on the government's classified 205:
In many cases, an analyst will have to request access to a new compartment or specific piece of information. It is hoped that this process will be speeded by the web-based services.
688: 229:
The Library of National Intelligence (LNI) is an ODNI project to create a repository of all Intelligence Community disseminated intelligence, regardless of classification. The
848: 53: 241:, which went into operation on 7 September 2007. It takes all the agency's intelligence information and makes it available to CIA analysts in one database. According to 773: 138: 567: 324: 711: 221:
and labeled by usefulness. It will eventually be able to recommend related documents to analysts, much like Amazon recommends related books.
130:
among people with weak ties, complementing the traditional "team-building" and "cross-functional management" characteristic of strong ties.
843: 838: 165: 153: 45: 30: 269: 176: 168:
agencies, according to Mike Wertheimer, assistant deputy director of national intelligence for analytic transformation and technology.
187:. Somalian and Russian information, sometimes down to the granularity of individual spy contributions, are in separate compartments. 667: 352: 320: 41: 99: 44:'s (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the 657: 634: 517: 183:
Control System, a major category of SCI, that does not necessarily allow an analyst working on Russia to see data on spies in
783: 298:
system uses a similar architecture to provide knowledge management and real-time updates on operational security analyses.
733: 540: 495: 385: 575: 213:
To ensure its usefulness, the project will launch with access to the three large databases of current intelligence and
833: 230: 49: 756: 635:"Young feds bring intell changes: A workforce bought up to use collaboration tools is making the CIA Web 2.0-savvy" 328: 76:
The Director of National Intelligence has identified A-Space as a critical piece of "Analytic Transformation":
65: 477: 316: 115: 806: 202:
nightmare. You've got to ask yourself, if there's one bad apple here, how much can that bad apple learn?"
295: 199: 84:
Within the analytic transformation program, there are several initiatives under way in three areas:
305: 613: 377: 302: 172: 663: 238: 605: 336: 119: 778: 403: 251: 94:
3) building more integrated analytic operations across the Intelligence Community (IC).
331:. Moreover, the geointel database would incorporate cutting open source intelligence ( 827: 437: 427: 134: 127: 111: 57: 642: 617: 432: 214: 123: 245:, CIA executive agent for LNI, the full LNI became available on 31 October 2007. 442: 278: 741: 549: 503: 422: 218: 61: 272:. Indeed, both analysts and consumers may be unaware of the common interests. 301:
The need is not only seen at top executive levels. According to Tim Hsia, a
195: 242: 98:
For contrast, see perceived limitations of CIA information technology at
21: 366: 184: 180: 478:"U.S. Spy Agencies Go Web 2.0 in Effort To Better Share Information" 609: 91:
2) managing the mission more effectively at a Community level, and
332: 286:
Again, social networking supports interaction through weak links.
20: 137:, deputy director of National Intelligence for Analysis at the 341: 265: 268:
report of interest, but not one from the State Department's
171:
Even though the system will be available only to users with
596:
Granovetter, Mark (May 1973), "The Strength of Weak Ties",
518:"National security and social networking are compatible" 106:
Assumptions about improving collaboration among analysts
807:"A-Space melds social media and intelligence gathering" 40:, is a project started in 2007 from the Office of the 685:"Intelligence Community Reform, A Cultural Evolution" 54:Joint Worldwide Intelligence Communications System 591: 589: 587: 585: 64:application (which has been superseded by Jive's 757:"Intelligence Collection and Sharing (Updated)" 628: 626: 535: 533: 531: 139:Office of the Director of National Intelligence 78: 471: 469: 467: 465: 463: 461: 459: 412:Government Computer News success stories, 2009 198:-ish about this," Wertheimer said. "This is a 88:1) enhancing the quality of analytic products, 8: 16:United States Intelligence Community A-Space 311:He describes the field need for a database: 849:Academic works about intelligence analysis 712:"CIA to launch integrated intell service" 734:"DIA at work on new data-sharing system" 237:One of the components of the LNI is the 656:Barnett, George A. (7 September 2011). 542:INSA Analytic Transformation Conference 455: 345:] solely from their agency ... 133:"How do you transform analysis?" asked 56:22 September 2008. A-Space is built on 476:Hoover, J. Nicholas (23 August 2007), 335:) products produced by news agencies, 683:Cardillo, Robert (10 December 2010). 572:Harvard Business School Faculty Blogs 7: 548:, 4–6 September 2007, archived from 225:The Library of National Intelligence 177:Sensitive compartmented intelligence 156:of the U.S. Intelligence Community. 31:United States Intelligence Community 633:Miller, Jason (10 September 2007), 386:service oriented architecture (SOA) 270:Bureau of Intelligence and Research 805:Jackson, Joab (20 November 2009). 732:Miller, Jason (26 November 2007), 710:Miller, Jason (6 September 2007). 662:. SAGE Publications. p. 332. 566:McAfee, Andrew (14 January 2008), 496:"A-Space set to launch this month" 14: 353:United States Army Special Forces 42:Director of National Intelligence 409:'s Best Inventions of 2008 (#32) 782:. December 2008. Archived from 659:Encyclopedia of Social Networks 325:Environmental Protection Agency 494:Bain, Ben (3 September 2008), 1: 598:American Journal of Sociology 844:Defense Intelligence Agency 839:Central Intelligence Agency 755:Hsia, Tim (November 2007), 445:– FBI's online encyclopedia 365:Hsia points out that while 296:Force Protection Assessment 231:Central Intelligence Agency 50:Defense Intelligence Agency 865: 100:CIA Information Technology 568:"Why Not Widen the Flow?" 774:"32. Facebook for Spies" 522:Government Computer News 329:National Security Agency 66:Social Business Software 317:geospatial intelligence 152:A-Space is open to all 116:Harvard Business School 72:Analytic transformation 397:Recognition and awards 363: 358: 347: 284: 256: 166:Intelligence Community 126:or A-Space encourages 110:A-Space, according to 82: 26: 738:Federal Computer Week 639:Federal Computer Week 500:Federal Computer Week 359: 348: 313: 290:Similar architectures 274: 247: 24: 200:counter-intelligence 691:on 22 December 2011 645:on 25 December 2007 555:on 27 February 2008 506:on 6 September 2008 834:2008 introductions 786:on 2 November 2008 761:Small Wars Journal 744:on 13 January 2008 378:Michael Wertheimer 303:United States Army 173:security clearance 27: 578:on 9 January 2008 315:A geointel, i.e. 259:Social networking 856: 818: 817: 815: 813: 802: 796: 795: 793: 791: 770: 764: 763: 752: 746: 745: 740:, archived from 729: 723: 722: 720: 718: 707: 701: 700: 698: 696: 687:. Archived from 680: 674: 673: 653: 647: 646: 641:, archived from 630: 621: 620: 604:(6): 1360–1380, 593: 580: 579: 574:, archived from 563: 557: 556: 554: 547: 537: 526: 525: 514: 508: 507: 502:, archived from 491: 485: 484: 473: 327:(EPA), CIA, and 321:State Department 191:Information Week 161:Information Week 120:Mark Granovetter 864: 863: 859: 858: 857: 855: 854: 853: 824: 823: 822: 821: 811: 809: 804: 803: 799: 789: 787: 772: 771: 767: 754: 753: 749: 731: 730: 726: 716: 714: 709: 708: 704: 694: 692: 682: 681: 677: 670: 655: 654: 650: 632: 631: 624: 595: 594: 583: 565: 564: 560: 552: 545: 539: 538: 529: 516: 515: 511: 493: 492: 488: 482:InformationWeek 475: 474: 457: 452: 419: 399: 375: 292: 261: 250: 227: 211: 175:for TOP SECRET 150: 108: 74: 17: 12: 11: 5: 862: 860: 852: 851: 846: 841: 836: 826: 825: 820: 819: 797: 765: 747: 724: 702: 675: 668: 648: 622: 610:10.1086/225469 581: 558: 527: 524:, 23 July 2009 509: 486: 454: 453: 451: 448: 447: 446: 440: 435: 430: 425: 418: 415: 414: 413: 410: 398: 395: 374: 371: 291: 288: 260: 257: 252:Dale Meyerrose 226: 223: 210: 207: 149: 146: 107: 104: 96: 95: 92: 89: 73: 70: 38:Analytic Space 15: 13: 10: 9: 6: 4: 3: 2: 861: 850: 847: 845: 842: 840: 837: 835: 832: 831: 829: 808: 801: 798: 785: 781: 780: 775: 769: 766: 762: 758: 751: 748: 743: 739: 735: 728: 725: 713: 706: 703: 690: 686: 679: 676: 671: 669:9781506338255 665: 661: 660: 652: 649: 644: 640: 636: 629: 627: 623: 619: 615: 611: 607: 603: 599: 592: 590: 588: 586: 582: 577: 573: 569: 562: 559: 551: 544: 543: 536: 534: 532: 528: 523: 519: 513: 510: 505: 501: 497: 490: 487: 483: 479: 472: 470: 468: 466: 464: 462: 460: 456: 449: 444: 441: 439: 438:Intellipublia 436: 434: 431: 429: 428:DoDTechipedia 426: 424: 421: 420: 416: 411: 408: 406: 402:Named one of 401: 400: 396: 394: 390: 387: 382: 379: 372: 370: 368: 362: 357: 354: 346: 344: 343: 338: 334: 330: 326: 322: 318: 312: 309: 307: 304: 299: 297: 289: 287: 283: 280: 273: 271: 267: 258: 255: 253: 246: 244: 240: 235: 232: 224: 222: 220: 216: 208: 206: 203: 201: 197: 192: 188: 186: 182: 178: 174: 169: 167: 162: 157: 155: 147: 145: 142: 140: 136: 135:Thomas Fingar 131: 129: 128:collaboration 125: 121: 117: 113: 112:Andrew McAfee 105: 103: 101: 93: 90: 87: 86: 85: 81: 77: 71: 69: 67: 63: 59: 58:Jive Software 55: 51: 47: 43: 39: 35: 32: 23: 19: 810:. Retrieved 800: 788:. Retrieved 784:the original 777: 768: 760: 750: 742:the original 737: 727: 715:. Retrieved 705: 693:. Retrieved 689:the original 678: 658: 651: 643:the original 638: 601: 597: 576:the original 571: 561: 550:the original 541: 521: 512: 504:the original 499: 489: 481: 433:Intellipedia 404: 391: 383: 376: 364: 360: 349: 340: 314: 310: 300: 293: 285: 275: 262: 248: 236: 228: 215:Intellipedia 212: 204: 190: 189: 170: 160: 158: 151: 143: 132: 124:Intellipedia 109: 97: 83: 79: 75: 37: 33: 28: 25:A-Space Logo 18: 812:18 February 717:18 February 695:18 February 443:Bureaupedia 279:text mining 154:16 elements 828:Categories 450:References 423:Diplopedia 219:TagConnect 62:Clearspace 790:9 January 393:day one. 196:Pollyanna 618:59578641 417:See also 407:magazine 243:Gus Hunt 239:CIA WIRe 148:Security 367:SIPRNET 306:captain 209:Content 185:Somalia 34:A-Space 666:  616:  282:specs. 181:HUMINT 614:S2CID 553:(PDF) 546:(PDF) 356:data. 333:OSINT 36:, or 814:2019 792:2009 779:Time 719:2019 697:2019 664:ISBN 405:Time 373:Cost 337:RAND 294:The 46:USIC 29:The 606:doi 342:sic 266:CIA 114:of 68:). 60:'s 830:: 776:. 759:, 736:, 637:, 625:^ 612:, 602:78 600:, 584:^ 570:, 530:^ 520:, 498:, 480:, 458:^ 384:A 323:, 102:. 816:. 794:. 721:. 699:. 672:. 608::

Index


United States Intelligence Community
Director of National Intelligence
USIC
Defense Intelligence Agency
Joint Worldwide Intelligence Communications System
Jive Software
Clearspace
Social Business Software
CIA Information Technology
Andrew McAfee
Harvard Business School
Mark Granovetter
Intellipedia
collaboration
Thomas Fingar
Office of the Director of National Intelligence
16 elements
Intelligence Community
security clearance
Sensitive compartmented intelligence
HUMINT
Somalia
Pollyanna
counter-intelligence
Intellipedia
TagConnect
Central Intelligence Agency
CIA WIRe
Gus Hunt

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.